Cyber 2.0

Cyber 2.0 prevents the spread of cyber-attacks in two different networks

Cyber 2.0 prevents the spread of cyber-attacks that every other defense system in the organization failed to stop (NDR)

Every customer receives a report with the list of malware that successfully bypassed all other cybersecurity systems, and was blocked by Cyber 2.0

Cyber 2.0 is the only solution that delivers true prevention, ensuring that only authorized computers running authorized software can access industrial controllers

Cyber 2.0 Vs All Other Systems

We expose others’ ultimate weaknesses by demonstrating their failure to prevent attacks

All cyber systems are installed on every computer, including the infected one

Cyber 2.0 blocks every malware after it had bypassed all other systems

The Proof

Providing each client with an AI-based report

The report includes a list of all malicious software, and vulnerable software exploited by attackers that bypassed all other cyber defenses systems, successfully exited an infected computer and attempted to spread within the organization

Cyber 2.0 stopped them, before they could even enter the targeted computers

The full list is attached in Excel sheet that includes Details about each software:

  • The source — from which computer
  • The time — when it was sent
  • The destination — where it attempted to reach

Each customer can easily verify that these malicious did, in fact, penetrate all their other defense systems

Our Technology

Other cybersecurity companies

Attempt to prevent malware from:

1. Entering to one of the computers (firewalls)

2. Infecting המחשב exiting from it to the network (EDRs)

Cyber 2.0 solution

Cyber 2.0 (NDR) takes the opposite approach

1. It allows malicious programs to exit without interference

Cyber 2.0’s Blocking

Cyber 2.0 blocks their entry into the rest of the computers

 

PARADOXICALLY

Allowing exit from an infected computer ensures blocking on the receiving side

BY DEFINITION

Every attack blocked by Cyber 2.0 on the computer it was targeting is an attack that exits from another infected computer, after having already bypassed all cyber defense systems.

The Analogy

The Goalkeeper Principle

  • Every ball stopped by the goalkeeper is one the defenders failed to stop
  • Every football team can afford to lose a defender or two but it can’t afford to lose its goalkeeper
  • Every organization can manage without some of its cyber defenses but it can’t afford to be without Cyber 2.0

We Solve Two Fundamental Cybersecurity Problems

PROBLEM
Detection

No cyber company can identify every new attack (Zero-Day)
Using AI creates thousands of mutations — impossible to detect all

SOLUTION
Zero Trust

WHAT WE DO

System does not need to detect each new attack

HOW WE DO IT

1. Define which software is allowed to move
2. All others = unauthorized

PROBLEM
Prevention

Defense systems can’t block programs they failed to identify
Hackers attack → Neutralize defenses → Malware spreads

SOLUTION
TrustMathematical Chaos

WHAT WE DO

Continues protecting even if attackers removed it

HOW WE DO IT

1. Not allowed software exits freely
2. Blocking done on receiving computers
3. homepage.problemsSolutions.solution2How3

The Chaos Model

Other Cyber Companies

Based on

Biological Models

Therefore vulnerable to attacks by hackers using similar models

(Hence all the terminology: virus, antivirus, mutations, etc.)

Cyber 2.0

Based on

Mathematical Chaos Theory

Which is unbreakable

(Even we can’t crack it)

The company has registered 9 patents for the system

video

Additional Advantages

Cost

The Cyber 2.0 system doesn’t add costs to the organization

On the contrary, it reduces costs, as it can replace multiple other

Virtual NAC

Enables only authorized devices to connect, inside or outside

the organizational network with no new hardware and zero IT hassle

No Overload

Operates without slowing down the network

Regulation

Operates without reading personal or private data.

We are not only compliant with GDPR – we assist organizations in meeting regulations

Updates

No software updates are required

Remote Work

An infected home computer will not infect the organization