Intelligent CISO Issue 03 | Page 51

COVER STORY nd-user Daniel Halter, Group IT Manager at VolitionRX VolitionRx Limited, a multinational cancer diagnostic company, has implemented a solution from Cylance to safeguard patient information. The company deployed CylancePROTECT to prevent malicious activity targeting endpoint devices before it can endanger sensitive patient information. www.intelligentciso.com | Issue 03 CRITICAL PROTECTION V olitionRx Limited is a multinational life sciences company focused on developing new ways to detect cancer. Current cancer diagnosis often involves expensive, unpleasant and/or invasive testing. Volition’s goal is to diagnose a range of cancers quickly, accurately and inexpensively, reducing the strain on over-burdened healthcare systems. One of its innovations is an early diagnostic test able to analyse a small sample of blood. time. We required an endpoint security solution that would enhance and improve our ability to detect threats such as zero- day attacks and ransomware without the need for clients to keep on updating definition files to remain safe. With critical information stored across its systems and with the healthcare industry being one of the most targeted for cyberattacks, security for Volition RX is paramount. The company’s ideal product needed to be reliable, efficient and easily manageable and it also had to be readily deployable to its operations in four separate countries. Daniel Halter, Group IT Manager at VolitionRX, said: “At VolitionRx, it had become quite clear that we needed a new endpoint security solution that provided us with worldwide coverage and visibility of all the devices in real According to Halter, traditional antivirus vendors were offering the same old solution ‘only slightly jazzier’. He said: “When we were looking at options some of the vendors were offering the tried, tested and more traditional approach to “Like all companies, our data is important, and we need to make sure we have in place security solutions that provide us with the ability to identify and stop the sophisticated cyberattacks that are prevalent today.” 51