The only system in the world that provides total defense
against the spread of cyber attacks within organizational networks



no way out

The first computer may be penetrated, but Cyber 2.0 will
isolate the attack and block its spreading

The infected computer will also be blocked
from sending information outside the organization
even if it was infected before the installation of Cyber 2.0

Cyber 2.0 blocks all types of attacks

The Current process

No 100% detection, no 100% prevention

Detection

Prevention

100% Detection

because of the emergence of new malicious software every second

100% Prevention

because once the system is penetrated, the organization is no longer protected

CYBER 2.0 SYSTEM

Blocking with no detection

Detection

Total Prevention

Cyber 2.0 does not fail the Detection test

because it skips over it

Cyber 2.0 does not fail the Prevention test

because the system is designed to continue protecting, even if it is completely removed

the chaos model

The Cyber World

is based on

biological models

that are vulnerable to attacks

by systems using similar models
(hence where the terminology virus
and anti-virus comes from)

is based on

mathematical chaos model

that cannot be breached

Explaining chaos theory

UNLIKE OTHER SYSTEMS

We don't study the organization's routine

We don't rely on attack database

We don't seek anomalies or alert

We don't rely on the infected computer's protection

We don't legitimize previously installed malicious programs

We don't have false positives or delayed responses to real threats

We don't require any updates

Renders reverse engineering ineffective

We simply block malicious software

Marking approved programs

Cyber 2.0 creates 3 distinct inventory lists

The IT manager:
Marks the list of approved programs that were installed by the IT, and are approved to access to network resources (Office, Acrobat, accounting, browser)

Not approved programs:
Every software that was not marked as an approved software (including every new and unknown software)

Typical No. of
allowed programs
(50)

CHAOS ENGINE

Complete blocking within the organization

#


ORDINARY ATTACKS AGAINST OTHER CYBER SYSTEMS

Will fail against Cyber 2.0

The Reverse Tracking Mechanism



#

CHAOS FOR FIREWALL/ Controller/ Car

A dedicated Gateway is deployed between the network and Firewall / Switch/ Controller / Cars /various unsupported network devices

#

DEPLOYMENT PROCESS

Full deployment will take no more than a few weeks

Cyber 2.0’s Patents

Unique Scrambling System- chaos engine

(Approved: US 9.838,368)

Unique Server Support system

(approved US 9.794,277))

Unique Gateway System (before Firewall)


Reverse Tracking Technology System


Rendering Reverse Engineering ineffective


Creating multiple Vlans without the use of hardware


Automatic creation of dynamic lists


Reverse Chaos for employees who work at home


Chaos SSL

#

road map

Q2 2019

End User Consumers

Q2 2019

IIoT including
autonomous cars

Q3 2019

Mobile

Q3 2019

Unix Mac

Q4 2019

Virtual Networks

Q1 2020

Chaos SSL

Our System

COMPETITIVE LANDSCAPE

Best Security and best performance

FAQ

Frequently Asked Questions

Neither. It’s a new, revolutionary and game-changing system unlike any other.

Almost all of them: IDS, IPS, Internal Firewall, Next Generation Antivirus, NAC, BOYP, None Human DLP, Password Acceleration, Honeypot (Sand Box), systems based on behavioral detection, anomaly detection, artificial intelligence and others.

Our system supports organizations of all types and sizes, no matter how many end points they have.

The deployment process was designed to be easy and seamless. The client is a simple MSI installer, that can be deployed by any remote deployment system.

No. You can deploy in sections as large or as small as you wish, and continue deployment whenever you decide. Cyber 2.0 can work with protected computers in defense mode, alongside computers in monitor mode and unprotected computers, all at the same time.

Currently, all Microsoft Windows 7 versions and above and Linux are supported (servers included). We will soon be releasing Mac-OS, Unix and Mobile versions.

All supported operating systems work on all virtual platforms.

Cyber 2.0 works seamlessly with network segmentation.

The use of Cyber 2.0 renders standard-deployed internal Firewall obsolete. However, Cyber 2.0 System can work with, and even enhance their defenses.

These attacks are automatically blocked by Cyber 2.0 System.

The command will run, but Cyber 2.0 System will block the access of the legitimate software, and will not allow it to go out of the computer or receive new commands. The administrator will receive an immediate alert.

Cyber 2.0 System renders IDS and IPS systems virtually obsolete. However, the organization may use them to monitor illegitimate traffic (unscrambled by Cyber 2.0) or allow the Cyber 2.0 Gateway system to translate the communications.

Neither. Cyber 2.0 System is different from any current signature or algorithm-based system. Its internal logic is based on chaos mathematics

No. No information is routed through our servers or saved on them.

No. Internet connection must be maintained only if the organization prefers and chooses the option of creating automated lists.

Since Cyber 2.0 is not a signature-based system, there is no need for periodic updates.

The attack will enable the command to run, but Cyber 2.0 System will block the access of the legitimate software, and will not allow it to go out of the computer or receive new commands or instructions. The administrator will receive an immediate alert.

No. White Lists failed because attackers identified the system, attacked it, tricked it or took it down. Cyber 2.0 does not use a White List like it was used in the past. It uses an automatically constructed Dynamic List, and the system is built so that if it’s down, port scrambling will cease, and there will be no traffic coming in from the infected computer.

No. Cyber 2.0 uses a unique Dynamic List. It is much more simple and easy to create and manage, and it may also be fully automated.

Viruses and Trojan programs disguised that look like legitimate programs (such as translation software, data compression software, accounting software and more), spyware masquerading as screensaver (Microsoft’s or other), Browser hijacking and Adware software (PUP and SPUP), that slow computers down, information and password stealing, malicious software, and Unknown software running on the organization networks. Cyber 2.0 detects only active programs already in outgoing traffic.