The system provides

active mapping of all processes and software in every computer, tracking their network activities, and identifying malicious software and processes

Total defense against the spread of cyber attacks within and outside organizational network


what does it means

The first computer may be penetrated
(due to bypassing the Firewall, a private laptop that is infected etc.)

but Cyber 2.0 will isolate the attack and block its spreading in the network

The first infected computer will also be blocked from sending information outside the organization, even if it was infected before the installation of Cyber 2.0

Cyber 2.0 blocks all types of attacks

The Current process

No 100% detection, no 100% prevention



100% Detection

because of the emergence of new malicious software every second

100% Prevention

because once the system is penetrated, the organization is no longer protected


Blocking with no detection


Total Prevention

Cyber 2.0 does not fail the Detection test

because it skips over it

Cyber 2.0 does not fail the Prevention test

because the system is designed to continue protecting, even if it is completely removed

the chaos model

The Cyber World

is based on

biological models

that are vulnerable to attacks

by systems using similar models
(hence where the terminology virus
and anti-virus comes from)

is based on

mathematical chaos model

that cannot be breached

Explaining chaos theory


We don't study the organization's routine

We don't rely on attack database

We don't seek anomalies or alert

We don't rely on the infected computer's protection

We don't legitimize previously installed malicious programs

We don't have false positives or delayed responses to real threats

We don't require any updates

Renders reverse engineering ineffective

We simply block malicious software

Marking approved programs

Cyber 2.0 creates 3 distinct inventory lists

The IT manager:
Marks the list of approved programs that were installed by the IT, and are approved to access to network resources (Office, Acrobat, accounting, browser)

Not approved programs:
Every software that was not marked as an approved software (including every new and unknown software)

Typical No. of
allowed programs


Complete blocking within the organization



Will fail against Cyber 2.0

The Reverse Tracking Mechanism



A dedicated Gateway is deployed between the network and Firewall / Switch/ Controller / Cars /various unsupported network devices



Full deployment will take no more than a few weeks

Cyber 2.0’s Patents

Unique Scrambling System- chaos engine

(Approved: US 9.838,368)

Unique Server Support system

(approved US 9.794,277))

Unique Gateway System (before Firewall)

Reverse Tracking Technology System

Rendering Reverse Engineering ineffective

Creating multiple Vlans without the use of hardware

Automatic creation of dynamic lists

Reverse Chaos for employees who work at home

Chaos SSL


Our System


Best Security and best performance


Frequently Asked Questions

Neither. It’s a new, revolutionary and game-changing system unlike any other.

Almost all of them: IDS, IPS, Internal Firewall, Next Generation Antivirus, NAC, BOYP, None Human DLP, Password Acceleration, Honeypot (Sand Box), systems based on behavioral detection, anomaly detection, artificial intelligence and others.

Our system supports organizations of all types and sizes, no matter how many end points they have.

The deployment process was designed to be easy and seamless. The client is a simple MSI installer, that can be deployed by any remote deployment system.

No. You can deploy in sections as large or as small as you wish, and continue deployment whenever you decide. Cyber 2.0 can work with protected computers in defense mode, alongside computers in monitor mode and unprotected computers, all at the same time.

Currently, all Microsoft Windows 7 versions and above and Linux are supported (servers included). We will soon be releasing Mac-OS, Unix and Mobile versions.

All supported operating systems work on all virtual platforms.

Cyber 2.0 works seamlessly with network segmentation.

The use of Cyber 2.0 renders standard-deployed internal Firewall obsolete. However, Cyber 2.0 System can work with, and even enhance their defenses.

These attacks are automatically blocked by Cyber 2.0 System.

The command will run, but Cyber 2.0 System will block the access of the legitimate software, and will not allow it to go out of the computer or receive new commands. The administrator will receive an immediate alert.

Cyber 2.0 System renders IDS and IPS systems virtually obsolete. However, the organization may use them to monitor illegitimate traffic (unscrambled by Cyber 2.0) or allow the Cyber 2.0 Gateway system to translate the communications.

Neither. Cyber 2.0 System is different from any current signature or algorithm-based system. Its internal logic is based on chaos mathematics

No. No information is routed through our servers or saved on them.

No. Internet connection must be maintained only if the organization prefers and chooses the option of creating automated lists.

Since Cyber 2.0 is not a signature-based system, there is no need for periodic updates.

The attack will enable the command to run, but Cyber 2.0 System will block the access of the legitimate software, and will not allow it to go out of the computer or receive new commands or instructions. The administrator will receive an immediate alert.

No. White Lists failed because attackers identified the system, attacked it, tricked it or took it down. Cyber 2.0 does not use a White List like it was used in the past. It uses an automatically constructed Dynamic List, and the system is built so that if it’s down, port scrambling will cease, and there will be no traffic coming in from the infected computer.

No. Cyber 2.0 uses a unique Dynamic List. It is much more simple and easy to create and manage, and it may also be fully automated.

Viruses and Trojan programs disguised that look like legitimate programs (such as translation software, data compression software, accounting software and more), spyware masquerading as screensaver (Microsoft’s or other), Browser hijacking and Adware software (PUP and SPUP), that slow computers down, information and password stealing, malicious software, and Unknown software running on the organization networks. Cyber 2.0 detects only active programs already in outgoing traffic.