What is Cyber 2.0? Firewall? An antivirus?
Neither. It’s a new, revolutionary, and game-changing system unlike any other
What types of cybersecurity systems are rendered unnecessary by Cyber 2.0?
IDS, IPS, Internal Firewall, Next Generation Antivirus, NAC, BOYP, None Human DLP, Password Acceleration, Honeypot (Sand Box), systems based on behavioral detection, anomaly detection, artificial intelligence and others
What types of cybersecurity companies are still useful?
External Firewall and internal antivirus companies
What types and sizes of organizations do you support?
Our system supports organizations of all types and sizes, no matter how many end points it has
How is the Cyber 2.0 system deployed in my organization?
The deployment process was designed to be easy and seamless. The client is a simple MSI installer, that can be deployed by any remote deployment system
Do I need to deploy the system across the entire organization at once?
No. You can deploy in sections as large or as small as you wish, and continue deployment whenever you decide.
Cyber 2.0 can work with protected computers in defense mode, alongside computers in monitor mode and unprotected computers, all at the same time
What type of operating systems does Cyber 2.0 support?
Currently, all Microsoft Windows 7 versions and above are supported (servers included).
We will soon be releasing Linux, Mac-OS, Unix and Mobile versions
What about virtual machines?
All supported operating systems work on all virtual platforms
What about network segmentation?
Cyber 2.0 works seamlessly with network segmentation
What about internal Firewalls?
The use of Cyber 2.0 renders standard-deployed internal Firewall obsolete. However, the Cyber 2.0 system can work with them,
and even enhance their defenses
What about DDos and similar attacks?
These attacks are automatically blocked by the Cyber 2.0 system
What about 0-day attacks, that enable attackers to run legitimate software, such as PowerShell, and use it to send commands?
The command will run, but the Cyber 2.0 system will block the access of the legitimate software, and will not allow it to go out of the computer or receive new commands. The administrator will receive an immediate alert
What about advanced IDS and IPS systems?
The Cyber 2.0 system renders IDS and IPS systems virtually obsolete. However, the organization may use them to monitor illegitimate traffic (unscrambled by Cyber 2.0) or allow the Cyber 2.0 Gateway system to translate the communications
Are Cyber 2.0 systems signature-based, algorithm-based or both?
Neither. The Cyber 2.0 system is different from any current signature or algorithm-based system. Its internal logic is based on chaos mathematics
Does Cyber 2.0 uses cloud-based servers to sync information from clients?
No. No information is routed through our servers or saved on them
Do I need to maintain an Internet connection to always keep the system up to date?
No. Internet connection must be maintained only if the organization prefers and chooses the option of creating automated lists
How do I update Cyber 2.0 software?
Since Cyber 2.0 is not a signature based system, there is no need for periodic updates
What about File-less infections?
The attack will enable the command to run, but the Cyber 2.0 system will block the access of the legitimate software, and will not allow it to go out of the computer or receive new commands or instructions. The administrator will receive an immediate alert
Isn’t the use of a White List cumbersome and obsolete?
White lists failed because attackers identified the system, attacked it, tricked it or took it down.
Cyber 2.0 does not use a White List like it was ever used in the past. It uses an automatically constructed Dynamic List, and the system is built so that even if it’s down, port scrambling will cease, and there will be no traffic coming in from the infected computer
Does the system require a more thorough White List compared to the past?
No. Cyber 2.0 uses a unique Dynamic List. It is much more simple and easy to create and manage, and it may also be fully automated