fbpx

CYBER 2 IT

Blocking the spread of Cyber attacks

CYBER 2 IT

Blocking the spread of Cyber attacks

Cyber 2.0 Integrated AV/EDR/XDR/MTD

Unlike standard defense systems, Cyber 2.0 is an integrated solution that acts as a Reverse EDR with Xtended detection and prevention capabilities with built-in default features of a Next-Gen AV.

In the initial stage, the Cyber 2.0 system defines and marks only software that is allowed to route around the network and makes use of network resources (about 100 out of thousands of software available on the organization’s computers)

Software that was not defined as allowed to route around the network (including any new and unknown software, whether it is malicious or not, including any new virus) will be blocked by the Cyber 2.0 system.

In other words, it does not need to detect malware.

In addition, Cyber 2.0 deploys its MOVING TARGET DEFENSE capabilities by constantly shifting and changing the incoming and outgoing ports using Chaos mathematics. This obscures the correct access ports of any attempt to assault them, causing any attempt to fail.

Read More

Network Intrusion Prevention System (NIPS)

Cyber 2.0’s AI-Based patented Chaos Engine works on the network layer. Every packet that traverses the network in or out of the computer passes through the Cyber 2.0 Chaos Engine and is logged, and the logs are sent to a central controlling server (local or cloud). The information is organized and analyzed by the central server and the user can view the following data:

  • Network -one single flow instead of hundreds of packets per connection
  • The source and destination of the flow
  • The source and destination ports
  • The user that initiates the network flow
  • The application or process name
  • The application or process #md5
  • The path of the running application
  • In case of a file system access, instead of a port, there will be the destination path and accessed files or doc
  • Incoming dropped packages
  • Incoming Broadcasts
  • Any application that was part of the chain of activation of that network flow

Since Cyber 2.0 uses Network Control instead of application control, creating a complete Zero Trust the network becomes viable and easy and once activated, it creates a barrier between the network computers, allowing only approved applications to travel between network resources, effectively creating a Network control state. https://www.cyber20.com

Host Intrusion Prevention System (HIPS)

The Reverse tracking mechanism works on the application layer. Every time an application is opened or an application uses accesses, sends data, communicates, or does any sort of interaction with another app or process, is registered, logged, and sent to a central controlling server (local or cloud). The information is organized and analyzed by the central server and the user can view the following data:

  • Any file or process that has been running on any computer
  • Display the name and true name of the process or file – (when applicable – not all processes and files have a true version)
  • The version of each file or process (when applicable – not all processes and files have a true version)
  •  The #md5
  • Allow the Chaos engine to display the chain of networks flows