CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership

Cylake Offers AI-Native Security Without Relying on Cloud Services

Dark Reading Archived Mar 16, 2026 ✓ Full text saved

Cylake's platform will analyze security data locally and identify potential attacks for organizations concerned about data sovereignty.

Full text archived locally
✦ AI Summary · Claude Sonnet


    ENDPOINT SECURITY CYBERSECURITY OPERATIONS CYBER RISK NEWS News, news analysis, and commentary on the latest trends in cybersecurity technology. Cylake Offers AI-Native Security Without Relying on Cloud Services Cylake's platform will analyze security data locally and identify potential attacks for organizations concerned about data sovereignty. Dark Reading Staff,Dark Reading March 6, 2026 2 Min Read SOURCE: SERGEY BALAKHNICHEV VIA ALAMY STOCK PHOTO NEWS BRIEF Nir Zuk built Palo Alto Networks from a scrappy startup to a $125 billion security giant. He is starting over again with Cylake, a cybersecurity startup that will provide cybersecurity for organizations  that cannot shift to the cloud over data sovereignty concerns. Many organizations, such as governments, defense contractors, and those in other highly regulated industries, are restricted from buying security products with features and services that depend on public cloud infrastructure because of regulatory and security requirements around their data. Cylake is building a hardware-based cybersecurity platform powered by artificial intelligence and data-driven analysis that these organizations can put in their environment. Because Cylake's system is designed to operate entirely in on-premises environments or within private cloud and does not rely on public cloud infrastructure, organizations maintain full control and sovereignty over their data.  Related:Zero Trust: Strengths and Limitations in the AI Attack Era Cylake will "deliver AI-native security entirely within the customer's own sovereign environment, serving a market where cybersecurity innovation hasn't kept up," wrote Asheem Chandna, a partner at Greylock Partners. Cylake is backed by $45 million from Greylock. "Cylake is focused on a segment of the market where security must operate under full control to meet regulatory and operational reality." According to Cylake, the next generation of AI-driven cybersecurity requires a holistic view of organizational infrastructure, combining data and context from multiple layers into a unified protection platform. Instead of sending operational and security data from sources such as network infrastructure, endpoints, cloud workloads, and existing security tools to cloud-based analysis tools, Cylake will pull all the data together in a single data layer to be analyzed locally using machine learning models and automated processes designed to detect anomalous patterns. Cylake's platform will identify potential security incidents, generate alerts, and help incident response teams analyze relationships between events and activity patterns. "Cylake is for institutions where maintaining full control over data and operations is not optional," Zuk said in a statement.  The funding will be used to develop the platform and refine its AI-native architecture. Cylake plans to work with several development partners to build out its platform. Commercial availability is expected in early 2027. Loading... Zuk founded Palo Alto Networks in 2005 and retired last August, shortly after the company completed its $25 billion acquisition of CyberArk. The other co-founders are Wilson Xu, who led the engineering team at Palo Alto Networks, and Ehud (Udi) Shamir, the co-founder of SentinelOne. Related:Bug in Google's Gemini AI Panel Opens Door to Hijacking Read more about: News Briefs About the Author Dark Reading Staff Dark Reading Dark Reading is a leading cybersecurity media site. More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report The ROI of AI in Security Cybersecurity Forecast 2026 ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like ENDPOINT SECURITY Is the Browser Becoming the New Endpoint? by Arielle Waldman SEP 09, 2025 ENDPOINT SECURITY We've All Been Wrong: Phishing Training Doesn't Work by Nate Nelson, Contributing Writer JUL 01, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 ENDPOINT SECURITY Qakbot Resurfaces in Fresh Wave of ClickFix Attacks by Elizabeth Montalbano, Contributing Writer MAR 31, 2025 Latest Articles in DR Technology CYBER RISK Why Post-Quantum Cryptography Can't Wait MAR 12, 2026 IDENTITY & ACCESS MANAGEMENT SECURITY Delinea's StrongDM Acquisition Highlights the Changing Role of PAM MAR 12, 2026 THREAT INTELLIGENCE Fig Security Emerges From Stealth to Fix Broken Security Operations MAR 5, 2026 CYBER RISK Speakeasies to Shadow AI: Banning AI Browsers Will Fail MAR 3, 2026 Read More DR Technology
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗