fbpx

MODES

Modes

Explanation of the various modes and capabilities of the Cyber 2.0 system:

  • Monitor
  • Isolation
  • Defense

Monitor Mode

Monitor Mode is the initial mode of the system when it is first installed on a network. It is designed to
gather and analyze information about the network it is installed on

Capabilities

  • Creating a comprehensive inventory of every process or file that has been active since the system was
    installed, stored information compromise from the following:
    1. Files
    2. Versions
    3. Installed location
    4. Various other information
  • Storing every network transaction on the installed system – the default setting is for 45 days (data can
    be stored indefinitely – depending on storage size)
  • Analyzing every installed software, version or executable using the file Hash, and showing every known
    malicious software on your organization
  • Allowing to create, edit and modify Cyber 2.0 Dynamic list
    1. Nothing will get blocked
    2. The customer will see what would or should have been blocked

Advantages

  • Full view of the system
  • A complete and comprehensive Inventory
  • Full analysis of the network

Disadvantage

  • No defense mechanism

Isolation Mode

  • Isolation Mode is designed to allow the organization to have fast and powerful protection against ransomware and similar forms of attack, while keeping all the benefits of Monitor Mode
  • Isolation Mode only blocks and prevents access to the file system, any other protocol will not be blocked, only reported

Capabilities

  • All the benefits of monitor mode
  • Example of Protected Protocols:
    1. UNC
    2. SMB
    3. Similar Network File System protocol
  • Protects software from accessing the network file system
    1. Program with admin privileges will be blocked
    2. Access to map drive will be blocked
  • Dynamic list automation is supported in Isolation Mode, allowing for smooth and almost zero
    maintenance
  • No other protocol is blocked or affected

Advantages

  • Full view of the system
  • A complete and comprehensive inventory
  • Fully analysis of the network
  • Light weight and easily manageable
  • Powerful protection against the spread and effect of ransom virus and similar malicious software

Disadvantage

  • Only the network file system access is protected
  • The first computer will be infected, but the network will be safe

Defense Mode

  • Internal Defense Mode is designed to bring the most cutting-edge defense into your organization. It creates an unpassable chaos barrier between the computer of a specific network and does not allow any unknown or unwanted application to traverse the network
  • Any attempt by malicious software to bypass or deactivate the mechanism will cause the offending software to get locked on the original computer, while the allowed programs keep working unhindered

Capabilities

  • All the benefits of Monitor Mode
  • All the benefits of Isolation Mode
  • All communication is scrambled
  • All network traffic is subject to the dynamic list rules
  • Dynamic list automation is supported in Defense Mode, allowing for smooth and almost zero maintenance

Advantages

  • Full view of the system
  • A complete and comprehensive Inventory
  • Fully analysis of the network
  • Light weight and easily manageable
  • Powerful protection against the spread and effect of known and unknown malicious software

Disadvantage

  • The first computer will be infected, but the network will be safe