The Technology – IT

Zero Trust

Reverse Tracking

Zero Day

Prevention

Detection

Technology – IT overview

The Chaos Model

Other cybersecurity systems

is based on

biological models

that are vulnerable to attacks
by systems using similar models

(hence where the terminology virus
and anti-virus scomes from)

Cyber 2.0 logo

is based on

mathematical chaos model

that can’t be breached

(Not even by us)

Video

Cyber 2.0 has registered 9 patents Patent icon

We Solve Two Fundamental Cybersecurity Problems

Problem 1 - Detection Detection spider icon

No cyber company can identify
every new attack ( Zero-Day )

Using AI > creates thousands of mutations >
impossible to detect all of them

We Solve Two Fundamental Cybersecurity Problems

The Cyber 2.0 Solution- Zero Trust Detection spider icon

How we do:

The system does not need to detect each one of the new attacks

What we do:

We only define which software is allowed to move on the network

All others are automatically classified as unauthorized to move

including any new software (malicious or not) as well as any new mutation, especially those based on AI

We Solve Two Fundamental Cybersecurity Problems

Problem 2 - Prevention Detection spider icon

Defense systems inherently can’t
block programs they failed to identify

Hackers Attack the first computer >Neutralize all defense
systems > Malware spreads to the organization

We Solve Two Fundamental Cybersecurity Problems

The Cyber 2.0 Solution- Mathematical Chaos Detection spider icon

What we do:

Continues to protect the organization, even if
the attackers have removed it from that computer

How we do:

Not allowed software exits from the computer freely

Allowed software does not get free passage

The blocking is done on the computers to which the malware was sent

Our Detection- Doesn't Miss Any New Attack

Maps all active applications
in the organization

Creates the list of applications that are
allowed to move on the network

Our Prevention - Continues Protecting

The technology: Chaos Algorithm

Image Chaos 1

1. Bypassing Cyber 2.0 Will Fail

Not approved software will still go out with the original port number

Image Chaos 1

2. Deactivating Cyber 2.0 Will Fail

All software will go out with the original port number

Image Chaos 2

3. Adding Software to The List Will Fail

Not approved software will still go out with the original port number
and the system will allocate incorrect port number

Image Chaos 3

4. Malicious Software Using Other Software Will Fail

Outlook sends legitimate emails according
to legitimate commands

When hackers compromise Outlook, every cyber
defense company will detect it

But the hackers are sophisticated - they embed malware,
using other legitimate software

4. Malicious Software Using Other Software Will Fail

Reverse Strip

Other cybersecurity systems

Will not block Outlook from going out to the
network

Cyber 2.0 - Reverse tracking

Our Reverse Tracking Technology tracks the chain
all the way back and blocks Outlook from going out to
the network

Implementation process

POC - A very short Process that demonstrates the system’s ability:
Blocking the spread of attacks
Functioning with no interruptions, nor any load

POC process diagram

Installation - Rapid deployment that is compatible
with all deployment methods (such as Sccm, Bigfix or GPO)

Installation process diagram

The Patents

Patent icon Unique Scrambling System- chaos engine ( approved US 9,838,368, US 10,313,318)
Patent icon Unique Server Support System ( approved US 9,794,277, US 9,985,981, US 10,333,956)
Patent icon Reverse Tracking Technology System ( approved US 10,616,231)
Patent icon Creating multiple Vlans without the use of hardware ( approved US 10,397,196)
Patent icon Unique Gateway System (submitted)
Patent icon Reverse Chaos for employees who work at home (submitted)
Patent icon Rendering Reverse Engineering ineffective (in process)
Patent icon Automatic creation of dynamic lists (in process)
Patent icon Chaos SSL (in process)