Cylake Offers AI-Native Security Without Relying on Cloud Services
Dark ReadingArchived Mar 16, 2026✓ Full text saved
Cylake's platform will analyze security data locally and identify potential attacks for organizations concerned about data sovereignty.
Full text archived locally
✦ AI Summary· Claude Sonnet
ENDPOINT SECURITY
CYBERSECURITY OPERATIONS
CYBER RISK
NEWS
News, news analysis, and commentary on the latest trends in cybersecurity technology.
Cylake Offers AI-Native Security Without Relying on Cloud Services
Cylake's platform will analyze security data locally and identify potential attacks for organizations concerned about data sovereignty.
Dark Reading Staff,Dark Reading
March 6, 2026
2 Min Read
SOURCE: SERGEY BALAKHNICHEV VIA ALAMY STOCK PHOTO
NEWS BRIEF
Nir Zuk built Palo Alto Networks from a scrappy startup to a $125 billion security giant. He is starting over again with Cylake, a cybersecurity startup that will provide cybersecurity for organizations that cannot shift to the cloud over data sovereignty concerns.
Many organizations, such as governments, defense contractors, and those in other highly regulated industries, are restricted from buying security products with features and services that depend on public cloud infrastructure because of regulatory and security requirements around their data. Cylake is building a hardware-based cybersecurity platform powered by artificial intelligence and data-driven analysis that these organizations can put in their environment. Because Cylake's system is designed to operate entirely in on-premises environments or within private cloud and does not rely on public cloud infrastructure, organizations maintain full control and sovereignty over their data.
Related:Zero Trust: Strengths and Limitations in the AI Attack Era
Cylake will "deliver AI-native security entirely within the customer's own sovereign environment, serving a market where cybersecurity innovation hasn't kept up," wrote Asheem Chandna, a partner at Greylock Partners. Cylake is backed by $45 million from Greylock. "Cylake is focused on a segment of the market where security must operate under full control to meet regulatory and operational reality."
According to Cylake, the next generation of AI-driven cybersecurity requires a holistic view of organizational infrastructure, combining data and context from multiple layers into a unified protection platform. Instead of sending operational and security data from sources such as network infrastructure, endpoints, cloud workloads, and existing security tools to cloud-based analysis tools, Cylake will pull all the data together in a single data layer to be analyzed locally using machine learning models and automated processes designed to detect anomalous patterns. Cylake's platform will identify potential security incidents, generate alerts, and help incident response teams analyze relationships between events and activity patterns.
"Cylake is for institutions where maintaining full control over data and operations is not optional," Zuk said in a statement.
The funding will be used to develop the platform and refine its AI-native architecture. Cylake plans to work with several development partners to build out its platform. Commercial availability is expected in early 2027.
Loading...
Zuk founded Palo Alto Networks in 2005 and retired last August, shortly after the company completed its $25 billion acquisition of CyberArk. The other co-founders are Wilson Xu, who led the engineering team at Palo Alto Networks, and Ehud (Udi) Shamir, the co-founder of SentinelOne.
Related:Bug in Google's Gemini AI Panel Opens Door to Hijacking
Read more about:
News Briefs
About the Author
Dark Reading Staff
Dark Reading
Dark Reading is a leading cybersecurity media site.
More Insights
Industry Reports
Frost Radar™: Non-human Identity Solutions
2026 CISO AI Risk Report
The ROI of AI in Security
Cybersecurity Forecast 2026
ThreatLabz 2025 Ransomware Report
Access More Research
Webinars
Building a Robust SOC in a Post-AI World
Retail Security: Protecting Customer Data and Payment Systems
Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need
Securing Remote and Hybrid Work Forecast: Beyond the VPN
AI-Powered Threat Detection: Beyond Traditional Security Models
More Webinars
You May Also Like
ENDPOINT SECURITY
Is the Browser Becoming the New Endpoint?
by Arielle Waldman
SEP 09, 2025
ENDPOINT SECURITY
We've All Been Wrong: Phishing Training Doesn't Work
by Nate Nelson, Contributing Writer
JUL 01, 2025
CYBERATTACKS & DATA BREACHES
DeepSeek Breach Opens Floodgates to Dark Web
by Emma Zaballos
APR 22, 2025
ENDPOINT SECURITY
Qakbot Resurfaces in Fresh Wave of ClickFix Attacks
by Elizabeth Montalbano, Contributing Writer
MAR 31, 2025
Latest Articles in DR Technology
CYBER RISK
Why Post-Quantum Cryptography Can't Wait
MAR 12, 2026
IDENTITY & ACCESS MANAGEMENT SECURITY
Delinea's StrongDM Acquisition Highlights the Changing Role of PAM
MAR 12, 2026
THREAT INTELLIGENCE
Fig Security Emerges From Stealth to Fix Broken Security Operations
MAR 5, 2026
CYBER RISK
Speakeasies to Shadow AI: Banning AI Browsers Will Fail
MAR 3, 2026
Read More DR Technology