Technology

Cyber 2.0 is based on a unique chaos algorithm and biological models that prevent the spread of attacks by blocking on the receiving side—without chasing signatures or mutations.

Technology overview

The Chaos Model

We map all active applications and establish an allow-list. Approved egress is scrambled; all ingress at receivers is descrambled. Anything not on the list is unauthorized to move.

Chaos model diagram

Detection (No Misses by Design)

No system can identify every new mutation. We don’t try. We define what is allowed to move; everything else—including AI-generated mutations—is blocked from moving inside the network.

Detection concept: allow-list vs mutations

Prevention (Receiver-Side Blocking)

Even if an endpoint is compromised—or our agent is removed—the receiving computers continue blocking unauthorized traffic. Exit is allowed from the infected computer; entry is blocked at the receivers.

Prevention concept: allow exit, block entry at receiver

OT & IoT Protection

Double Zero-Trust architecture and Vortex Gateway extend the same model to OT/IoT environments, preventing attacks from reaching controllers in the first place.

Learn more in the OT page

OT & IoT Vortex Gateway

Additional Advantages

  • No added costs; can replace multiple tools
  • No network overload
  • Privacy-respecting and regulation-friendly
  • Remote work safe: infected home PCs can’t infect the org
  • Virtual NAC without new hardware
  • No software updates required
Icons or infographic of additional advantages

Global Footprint

Presence and deployments across regions and industries.

Global map or presence graphic

Attack Types

Examples of attacks blocked at the receiver even after bypassing other defenses.

Attack type (slide 24)
Slide 24
Attack type (slide 25)
Slide 25
Attack type (slide 26)
Slide 26
Attack type (slide 27)
Slide 27
Attack type (slide 28)
Slide 28
Attack type (slide 29)
Slide 29
Attack type (slide 30)
Slide 30

Implementation

A streamlined rollout without hardware changes. Virtual NAC capability and receiver-side enforcement keep networks protected during and after deployment.

Implementation steps or architecture

Patents

Granted and pending patents covering the chaos engine, server support, reverse tracking, VLAN creation without hardware, gateway systems, and more.

Full list available on request or in Resources.

Patents list or badges