The only system in the world that provides Total defense
against the spread of cyber attacks within organizational networks

no way out

The first computer may be penetrated, but Cyber 2.0 will
isolate the attack and block its spreading

The infected computer will also be blocked
from sending information outside the organization
even if it was infected before the installation of Cyber 2.0

the chaos model

The Cyber World

is based on

biological models

that are vulnerable to attacks

by systems using similar models
(hence where the terminology virus
and anti-virus comes from)

is based on

mathematical chaos model

that cannot be breached

Explaining chaos theory

The Current process

No 100% detection, no 100% prevention



100% Detection

because of the emergence of new malicious software every second

100% Prevention

because once the system is penetrated, the organization is no longer protected


Blocking with no detection


Total Prevention

Cyber 2.0 does not fail the Detection test

because it skips over it

Cyber 2.0 does not fail the Prevention test

because the system is designed to continue protecting, even if it is completely removed


We don't study the organization's routine

We don't rely on attack database

We don't seek anomalies or alert

We don't rely on the infected computer's protection

We don't legitimize previous installed malicious programs

We don't have false positives or delayed responses to real threats

We don't require any updates

Renders reverse engineering ineffective

We simply block malicious software

Marking approved software

Cyber 2.0 creates 3 distinct inventory lists

The IT manager:
Marks the list of approved software that were installed by the IT, and are approved to access to network resources (Office, Acrobat, accounting, browser)

Not approved software:
Every software that was not marked as an approved software (including every new and unknown software)

Approved Software


Complete blocking within the organization


Will fail against Cyber 2.0

The Reverse Tracking Mechanism

CHAOS Firewall

A dedicated Gateway is deployed between the network and Firewall/ various unsupported network devices


Our list of products

Network Inventory

Creating 3 distinct inventory lists

Monitor Mode

An intermediate state before activating defense mode

Isolation Mode

The most effective in blocking and preventing ransomware attacks

Defense Mode

100% defense against the spread of cyber attacks

NAC: Network Access Control

Replacing standard NAC hardware mechanic with no hardware


VLANS Without using specialized equipment


Analyzing network behavior

Next Steps

In the future


Full deployment will take no more than a few weeks

Quick POC

Quick POC 1 week and 20 computers

Cyber 2.0 will point at all malicious programs that have not been detected by other systems deployed in the organization

Monitor Mode

Marking legitimate software

removing unauthorized software

Defense Mode options

Automatic approval of all existing software, blocking only new malicious software

Most of the organization is in monitor mode, critical systems in defense mode

Isolation - defense against ransomware

Full defense

Cyber 2.0’s Patents

Unique scrambling system - Chaos Engine

(Approved: US 9.838,368)

Unique server support system

(Approved: US 9.794,277)

Unique Gateway System (before Firewall)

Reverse Tracking Technology System

Rendering reverse engineering ineffective

Creating multiple Vlans without the use of hardware

Automatic creation of dynamic lists

Reverse Chaos for at home employees

Chaos SSL


road map

Q4 2018

Check Point Integration

Q1 2019

Cloud Based Services

Q1 2019

End User Consumers

Q2 2019


Q3 2019

Unix Mac

Q3 2019

IIoT including
autonomous cars

Q4 2019

Virtual Networks

Q1 2020

Serversless Cloud

Our System


Frequently Asked Questions

Neither. It’s a new, revolutionary and game-changing system unlike any other.

Almost all of them: IDS, IPS, Internal Firewall, Next Generation Antivirus, NAC, BOYP, None Human DLP, Password Acceleration, Honeypot (Sand Box), systems based on behavioral detection, anomaly detection, artificial intelligence and others.

Our system supports organizations of all types and sizes, no matter how many end points they have.

The deployment process was designed to be easy and seamless. The client is a simple MSI installer, that can be deployed by any remote deployment system.

No. You can deploy in sections as large or as small as you wish, and continue deployment whenever you decide. Cyber 2.0 can work with protected computers in defense mode, alongside computers in monitor mode and unprotected computers, all at the same time.

Currently, all Microsoft Windows 7 versions and above and Linux are supported (servers included). We will soon be releasing Mac-OS, Unix and Mobile versions.

All supported operating systems work on all virtual platforms.

Cyber 2.0 works seamlessly with network segmentation.

The use of Cyber 2.0 renders standard-deployed internal Firewall obsolete. However, Cyber 2.0 System can work with, and even enhance their defenses.

These attacks are automatically blocked by Cyber 2.0 System.

The command will run, but Cyber 2.0 System will block the access of the legitimate software, and will not allow it to go out of the computer or receive new commands. The administrator will receive an immediate alert.

Cyber 2.0 System renders IDS and IPS systems virtually obsolete. However, the organization may use them to monitor illegitimate traffic (unscrambled by Cyber 2.0) or allow the Cyber 2.0 Gateway system to translate the communications.

Neither. Cyber 2.0 System is different from any current signature or algorithm-based system. Its internal logic is based on chaos mathematics

No. No information is routed through our servers or saved on them.

No. Internet connection must be maintained only if the organization prefers and chooses the option of creating automated lists.

Since Cyber 2.0 is not a signature-based system, there is no need for periodic updates.

The attack will enable the command to run, but Cyber 2.0 System will block the access of the legitimate software, and will not allow it to go out of the computer or receive new commands or instructions. The administrator will receive an immediate alert.

White Lists failed because attackers identified the system, attacked it, tricked it or took it down. Cyber 2.0 does not use a White List like it was used in the past. It uses an automatically constructed Dynamic List, and the system is built so that if it’s down, port scrambling will cease, and there will be no traffic coming in from the infected computer.

White Lists failed because attackers identified the system, attacked it, tricked it or took it down. No. Cyber 2.0 uses a unique Dynamic List. It is much more simple and easy to create and manage, and it may also be fully automated.

Viruses and Trojan programs disguised that look like legitimate programs (such as translation software, data compression software, accounting software and more), spyware masquerading as screensaver (Microsoft’s or other), Browser hijacking and adware software (PUP and SPUP), that slow computers down, information and password stealing, malicious software, and Unknown software running on the organization networks. Cyber 2.0 detects only active programs already in outgoing traffic.