What is Cyber 2.0? Firewall? An antivirus?

Neither. It’s a new, revolutionary, and game-changing system unlike any other

What types of cybersecurity systems are rendered unnecessary by Cyber 2.0?

IDS, IPS, Internal Firewall, Next Generation Antivirus, NAC, BOYP, None Human DLP, Password Acceleration, Honeypot (Sand Box), systems based on behavioral detection, anomaly detection, artificial intelligence and others

What types of cybersecurity companies are still useful?

External Firewall and internal antivirus companies

What types and sizes of organizations do you support?

Our system supports organizations of all types and sizes, no matter how many end points it has

How is the Cyber 2.0 system deployed in my organization?

The deployment process was designed to be easy and seamless. The client is a simple MSI installer, that can be deployed by any remote deployment system

Do I need to deploy the system across the entire organization at once?

No. You can deploy in sections as large or as small as you wish, and continue deployment whenever you decide. Cyber 2.0 can work with protected computers in defense mode, alongside computers in monitor mode and unprotected computers, all at the same time

What type of operating systems does Cyber 2.0 support?

Currently, all Microsoft Windows 7 versions and above are supported (servers included).
We will soon be releasing Linux, Mac-OS, Unix and Mobile versions

What about virtual machines?

All supported operating systems work on all virtual platforms

What about network segmentation?

Cyber 2.0 works seamlessly with network segmentation

What about internal Firewalls?

The use of Cyber 2.0 renders standard-deployed internal Firewall obsolete. However, the Cyber 2.0 system can work with them, and even enhance their defenses

What about DDos and similar attacks?

These attacks are automatically blocked by the Cyber 2.0 system

What about 0-day attacks, that enable attackers to run legitimate software, such as PowerShell, and use it to send commands?

The command will run, but the Cyber 2.0 system will block the access of the legitimate software, and will not allow it to go out of the computer or receive new commands. The administrator will receive an immediate alert

What about advanced IDS and IPS systems?

The Cyber 2.0 system renders IDS and IPS systems virtually obsolete. However, the organization may use them to monitor illegitimate traffic (unscrambled by Cyber 2.0) or allow the Cyber 2.0 Gateway system to translate the communications

Are Cyber 2.0 systems signature-based, algorithm-based or both?

Neither. The Cyber 2.0 system is different from any current signature or algorithm-based system. Its internal logic is based on chaos mathematics

Does Cyber 2.0 uses cloud-based servers to sync information from clients?

No. No information is routed through our servers or saved on them

Do I need to maintain an Internet connection to always keep the system up to date?

No. Internet connection must be maintained only if the organization prefers and chooses the option of creating automated lists

How do I update Cyber 2.0 software?

Since Cyber 2.0 is not a signature based system, there is no need for periodic updates

What about File-less infections?

The attack will enable the command to run, but the Cyber 2.0 system will block the access of the legitimate software, and will not allow it to go out of the computer or receive new commands or instructions. The administrator will receive an immediate alert

Isn’t the use of a White List cumbersome and obsolete?

White lists failed because attackers identified the system, attacked it, tricked it or took it down. Cyber 2.0 does not use a White List like it was ever used in the past. It uses an automatically constructed Dynamic List, and the system is built so that even if it’s down, port scrambling will cease, and there will be no traffic coming in from the infected computer

Does the system require a more thorough White List compared to the past?

No. Cyber 2.0 uses a unique Dynamic List. It is much more simple and easy to create and manage, and it may also be fully automated