1 00:00:04,360 --> 00:00:07,040 Speaker 1: New antivirus software that's taking a different approach. 2 00:00:07,120 --> 00:00:10,039 Speaker 2: What's going on, imrich Demiro. This is rich on Tech. 3 00:00:10,440 --> 00:00:13,080 Speaker 1: For years, antivirus software has worked in pretty much the 4 00:00:13,119 --> 00:00:16,880 Speaker 1: same way. Companies find viruses and malware that identify their 5 00:00:16,960 --> 00:00:20,160 Speaker 1: key characteristics, then they add them to their list of definitions. 6 00:00:20,480 --> 00:00:22,160 Speaker 2: Antivirus software on your home. 7 00:00:21,960 --> 00:00:25,599 Speaker 1: Computer gets that list of updated definitions, then it checks 8 00:00:25,640 --> 00:00:27,080 Speaker 1: the files on your computer. 9 00:00:26,880 --> 00:00:27,960 Speaker 2: Against those lists. 10 00:00:28,280 --> 00:00:30,760 Speaker 1: The problem is, if an app hasn't seen a particular 11 00:00:30,840 --> 00:00:33,680 Speaker 1: virus or malware, it could be pretty ineffective against it. 12 00:00:33,840 --> 00:00:36,199 Speaker 1: Now a new company named Silance I've recently met with. 13 00:00:36,320 --> 00:00:39,839 Speaker 1: They're taking a totally different approach. They are literally teaching 14 00:00:39,960 --> 00:00:43,239 Speaker 1: their anti virus software to be smart. Thanks to artificial 15 00:00:43,240 --> 00:00:46,600 Speaker 1: intelligence and machine learning, it can spot a bad file 16 00:00:46,840 --> 00:00:48,080 Speaker 1: even if it's never. 17 00:00:47,880 --> 00:00:49,960 Speaker 2: Seen it before. Yes, it is really cool. 18 00:00:50,200 --> 00:00:52,720 Speaker 1: I went over to their headquarters in Irvine, California and 19 00:00:52,760 --> 00:00:55,400 Speaker 1: talked to Christopher Bray. He is the head of their 20 00:00:55,440 --> 00:00:56,640 Speaker 1: new consumer division. 21 00:00:56,840 --> 00:00:59,640 Speaker 3: The threats have increased exponentially. Back in the early days, 22 00:00:59,760 --> 00:01:02,400 Speaker 3: I think we all remember the Melissa viruses. In the 23 00:01:02,440 --> 00:01:06,640 Speaker 3: early two thousands, we had a handful of new unknown 24 00:01:06,720 --> 00:01:11,080 Speaker 3: malicious software released monthly. These days, We've got three hundred 25 00:01:11,080 --> 00:01:15,040 Speaker 3: and fifty thousand pieces of malicious software being released daily, 26 00:01:15,680 --> 00:01:21,399 Speaker 3: new malicious software, and it doesn't discriminate. It'll attack companies, 27 00:01:21,480 --> 00:01:27,240 Speaker 3: it'll attack individuals. It's largely driven by financial motivations. It's 28 00:01:27,280 --> 00:01:30,680 Speaker 3: crime driven. Back in the old days, people who used 29 00:01:30,720 --> 00:01:33,320 Speaker 3: to write malicious software, we're kids who are looking for 30 00:01:33,319 --> 00:01:37,280 Speaker 3: digital bragging rights. It was the equivalent of breaking a window. 31 00:01:37,840 --> 00:01:44,360 Speaker 3: Today it's evolved to very, very sophisticated organizations that hire 32 00:01:44,400 --> 00:01:50,040 Speaker 3: the best and brightest and write software that surreptitiously compromises 33 00:01:50,080 --> 00:01:55,320 Speaker 3: your identity, steals your credentials, ransoms your system any way 34 00:01:55,320 --> 00:01:56,480 Speaker 3: that they can get money out of you. 35 00:01:56,840 --> 00:02:00,760 Speaker 1: Silence literally teaches their software, so they feed their all 36 00:02:00,840 --> 00:02:03,840 Speaker 1: kinds of good and bad files so they can understand 37 00:02:03,920 --> 00:02:05,560 Speaker 1: the differences between them. 38 00:02:05,840 --> 00:02:08,680 Speaker 3: We take what we call a proactive approach, which means 39 00:02:09,200 --> 00:02:13,040 Speaker 3: we don't need to rely on updates or getting actual 40 00:02:13,360 --> 00:02:17,360 Speaker 3: copies of the malicious software to write a fix for it. Rather, 41 00:02:17,560 --> 00:02:20,360 Speaker 3: we use the power of artificial intelligence and machine learning 42 00:02:20,760 --> 00:02:24,400 Speaker 3: in order to identify good and bad software before it 43 00:02:24,480 --> 00:02:25,839 Speaker 3: even has an opportunity to run. 44 00:02:26,160 --> 00:02:28,000 Speaker 1: They gave me a demo of just how powerful their 45 00:02:28,040 --> 00:02:31,079 Speaker 1: software can be. So we did the same scenario twice. 46 00:02:31,240 --> 00:02:34,440 Speaker 1: First we clicked on an infected attachment on an unprotected 47 00:02:34,480 --> 00:02:37,519 Speaker 1: computer and we saw ransomware take over the entire screen. 48 00:02:37,919 --> 00:02:40,400 Speaker 1: Then we clicked on the same exact attachment on a 49 00:02:40,440 --> 00:02:43,600 Speaker 1: computer that had the Silent software on it, and Silence 50 00:02:43,760 --> 00:02:47,840 Speaker 1: literally stopped the ransomware before it had any opportunity to act. 51 00:02:47,960 --> 00:02:51,160 Speaker 3: You know, a common attract vector is phishing emails. So 52 00:02:51,200 --> 00:02:54,880 Speaker 3: you'll get an email from someone that you trust, maybe 53 00:02:54,960 --> 00:02:57,840 Speaker 3: it's your bank, maybe it's a friend, and it's got 54 00:02:57,840 --> 00:03:00,000 Speaker 3: an innocuous document that's attached to. 55 00:03:00,160 --> 00:03:01,600 Speaker 4: It asks you to double click. 56 00:03:01,800 --> 00:03:03,920 Speaker 3: You do that, and all of a sudden, you've just 57 00:03:04,040 --> 00:03:06,560 Speaker 3: unleashed some sort of malicious. 58 00:03:06,120 --> 00:03:07,399 Speaker 4: Software like ransomware. 59 00:03:07,560 --> 00:03:10,880 Speaker 3: So if you're running a Silence entivirus, the minute you 60 00:03:10,960 --> 00:03:14,720 Speaker 3: double click on that malicious attachment, it does a split 61 00:03:14,760 --> 00:03:17,240 Speaker 3: second assessment is this good or is it bad? And 62 00:03:17,280 --> 00:03:20,240 Speaker 3: if it's bad, it'll throw it into quarantine right away, 63 00:03:20,440 --> 00:03:22,640 Speaker 3: preventing it from running it all. 64 00:03:22,919 --> 00:03:25,560 Speaker 1: Now you might be thinking, can't any old antivirus software 65 00:03:25,600 --> 00:03:28,720 Speaker 1: do this? Possibly, yes, But the difference here is that 66 00:03:28,760 --> 00:03:31,679 Speaker 1: Silence can understand whether a file is good or bad. 67 00:03:31,720 --> 00:03:33,040 Speaker 2: That means even if. 68 00:03:32,880 --> 00:03:36,000 Speaker 1: Nobody's ever seen it before, or if it's totally undiscovered, 69 00:03:36,320 --> 00:03:38,120 Speaker 1: Silence can still stop it. 70 00:03:38,400 --> 00:03:41,240 Speaker 3: You know, this algorithm that we feed billions and billions 71 00:03:41,280 --> 00:03:44,640 Speaker 3: of samples of good software and bad software, and through 72 00:03:44,680 --> 00:03:48,120 Speaker 3: machine learning and AI, we train it and it gets 73 00:03:48,120 --> 00:03:51,000 Speaker 3: more and more refined with time, and then the output 74 00:03:51,240 --> 00:03:54,240 Speaker 3: of that algorithm is the software that we actually put 75 00:03:54,280 --> 00:03:55,200 Speaker 3: on people's desktops. 76 00:03:55,800 --> 00:03:57,800 Speaker 4: And what's cool about it is. 77 00:03:57,800 --> 00:04:01,800 Speaker 3: It doesn't need to connect to any server or cloud 78 00:04:01,840 --> 00:04:05,360 Speaker 3: in order to protect you. It it encapsulates all the 79 00:04:05,480 --> 00:04:08,880 Speaker 3: learning that in that application. 80 00:04:09,120 --> 00:04:11,520 Speaker 1: Now, I've been running Silence on my Mac computer to 81 00:04:11,600 --> 00:04:13,760 Speaker 1: try it out, and I got to say, I am impressed. 82 00:04:14,080 --> 00:04:15,720 Speaker 2: It's small, the app is lightweight. 83 00:04:15,760 --> 00:04:18,040 Speaker 1: It kind of stays tucked away in the background until 84 00:04:18,080 --> 00:04:20,040 Speaker 1: it needs to spring into action, which, by the way, 85 00:04:20,200 --> 00:04:22,400 Speaker 1: so far it hasn't had to on my computer. But 86 00:04:22,520 --> 00:04:24,880 Speaker 1: this is on a lot of other anti virus programs, 87 00:04:24,920 --> 00:04:26,840 Speaker 1: even the ones that I've installed on my Mac, They're 88 00:04:26,880 --> 00:04:30,360 Speaker 1: constantly nagging you to do a system scan, update their files, 89 00:04:30,680 --> 00:04:33,039 Speaker 1: or they just in general hog your system resources. 90 00:04:33,279 --> 00:04:35,160 Speaker 4: We've been around for approximately six years. 91 00:04:35,360 --> 00:04:38,120 Speaker 3: We started in the business space and have been very 92 00:04:38,120 --> 00:04:42,159 Speaker 3: successful in that space and quite disruptive, and our plan 93 00:04:42,279 --> 00:04:45,960 Speaker 3: is to replicate that in the consumer space and offer 94 00:04:45,960 --> 00:04:51,560 Speaker 3: consumers a fresh alternative to the commonly perceived system slowing. 95 00:04:51,480 --> 00:04:53,600 Speaker 4: Pop up riddled user experience. 96 00:04:54,360 --> 00:04:58,680 Speaker 3: A lot of users have soured on what they've seen 97 00:04:58,720 --> 00:05:01,520 Speaker 3: in the industry. A lot of vendors will do They'll 98 00:05:01,680 --> 00:05:04,800 Speaker 3: offer a firesale price for the first year, and then 99 00:05:04,800 --> 00:05:06,880 Speaker 3: they get surprise on an auto renewal for a much 100 00:05:06,920 --> 00:05:07,599 Speaker 3: higher price. 101 00:05:08,000 --> 00:05:09,520 Speaker 4: We take a completely different approach. 102 00:05:09,760 --> 00:05:12,200 Speaker 3: We're very transparent in our pricing and we say, look, 103 00:05:12,200 --> 00:05:14,839 Speaker 3: if you sign up for two years, then you'll get 104 00:05:14,880 --> 00:05:16,960 Speaker 3: a benefit, and if you do the math, our two 105 00:05:17,040 --> 00:05:19,160 Speaker 3: year price actually works out to be better than a 106 00:05:19,200 --> 00:05:20,039 Speaker 3: lot of our competitors. 107 00:05:20,640 --> 00:05:23,839 Speaker 1: Silance Smart antivirus software as it's called, starts at thirty 108 00:05:23,880 --> 00:05:26,719 Speaker 1: dollars a year. My pick is the five or ten 109 00:05:26,839 --> 00:05:30,080 Speaker 1: pack of licenses. This can protect all the computers in 110 00:05:30,120 --> 00:05:32,919 Speaker 1: your household. Two years of protection runs eighty or one 111 00:05:33,000 --> 00:05:34,839 Speaker 1: hundred dollars, which is a pretty good value when you 112 00:05:34,839 --> 00:05:37,280 Speaker 1: think about the flip side of having to deal with 113 00:05:37,320 --> 00:05:40,120 Speaker 1: some sort of ransomware mess And I really have no 114 00:05:40,320 --> 00:05:43,599 Speaker 1: doubt that AI and machine learning will be the model 115 00:05:43,640 --> 00:05:46,960 Speaker 1: for computer protection going forward. Silance is just one of 116 00:05:47,000 --> 00:05:49,839 Speaker 1: those companies at the forefront of it right now. If 117 00:05:49,880 --> 00:05:50,960 Speaker 1: you want to learn more, you can go to my 118 00:05:50,960 --> 00:05:53,960 Speaker 1: website For a link, it's Rich on tech dot TV. 119 00:05:54,360 --> 00:05:56,680 Speaker 2: Thanks so much for listening. I'm Rich Demiro. I'll talk 120 00:05:56,720 --> 00:05:57,719 Speaker 2: to you real service