The system provides active mapping and total defense against the spread of cyber attacks within organizational networks

active mapping of all processes and software in every computer, tracking their network activities, and identifying malicious software and processes

Total defense against the spread of cyber attacks within and outside organizational network

DEFENSE AGAINST THE SPREAD OF CYBER ATTACKS

what does it means

The first computer may be penetrated
(due to bypassing the Firewall, a private laptop that is infected etc.)

but Cyber 2.0 will isolate the attack and block its spreading in the network

The first infected computer will also be blocked from sending information outside the organization, even if it was infected before the installation of Cyber 2.0

CYBER 2.0 SYSTEM CANNOT BE BREACHED

Therefore, we invited all hackers to hack our system:

June 2018– Hackers Challenge Israel; Reward = NIS 100,000 Nobody hacked it


Feb 2019– Hackers Challenge Atlanta; Reward = $ 100,000 Nobody hacked it



Next step: Worldwide, Nonstop, open to all, every month a bigger reward

Prevention with no detection

The Cyber World

Detection > Prevention

100% detection is not possible

100% prevention is not possible

Prevention with no detection

No need to do detection

Total Prevention

Mathematical chaos model vs biological model

The Cyber World

is based on

biological models

that are vulnerable to attacks

is based on

mathematical chaos model

that cannot be breached

DEPLOYMENT PROCESS

Full deployment will take no more than a few weeks

What clients say

temp

Landmarks

9 patents

The most important were already approved

The Israel Innovation Authority support

3 consecutive years


Many Satisfied customers


Think you can hack us?

Think Twice

3

Challenges

956

Hackers

3,235,261

Attacks

100

Defense

Among our customers