Prevents the spread of cyber-attacks
Thousands of Cyber Systems on the market
All together < 100% defense
EDR, MDR , XDR, Monitoring
IDS, IPS, NAC, SOC
Weaknesses Identification
IR, Vlans, Consulting Services
Forensics, Gateway
Antivirus
Next Gen Antivirus,
Firewall
Next-Generation Firewall
DDos protection
Vaults, Network Mapping
Data Recovery, Phishing
Penetration Test, Events
Anal sis Sandbox, Spam
floodgates
proxies, Safebox, Packet Filter
Circuit-Level Gateway
Stateful Application Firewall
Application-Level Threat-Focused …..…
The Problem We Solve
The main damage is the spread of cyber-attacks across the organization
We provide total defense against
the spreading of all cyber-attacks
including new and unknown ones
within and outside the organizational network
We focuses only on that and do it better than any other Cyber company
Detection
Prevention
First they try to detect and recognize
every malicious software
Then try to prevent its spreading
within the organizational network
They can’t ensure 100% Detection
Because of new malicious software every second
How Other Companies Act
They can’t really ensure a complete solution:
They can’t ensure 100% Prevention
Because they can’t prevent the spread of
any malware that they didn’t detect
and because hackers can remove the defense systems
Cyber 2.0 Provides Full Solution
Doesn’t miss any new
cyber-attack
The system continues protecting even if being removed
Detection
Total Prevention
Cyber 2.0 Solution
We only define which programs are allowed to move on the network
we do not prevent malware from going out of the infected computer
The technology: Zero Trust
The technology: Chaos Algorithm
Detection
Prevention
Anything that has not been defined as such,
including any new software - will be blocked
Therefore, even if hackers have removed our protection from that infected computer, our system continues to prevent the spread of cyber-attacks from it.
Our blocking is done on the computers to which
the malware was sent
Actually, we do the opposite, we allow it to go out
is based on
mathematical chaos model
is based on
biological models
The Cyber World
The Chaos Model
Cyber 2.0 is protected by 9 patents
that are vulnerable to attacks
by systems using similar models �(hence where the terminology virus �and anti-virus comes from)
that can’t be breached
(Not even by us)
Unhackable System
They all failed
Ports:
Ashdod, The Israeli largest port,�Thessaloniki Port
Water Systems
: Mekorot,The National water company of Israel, 60% of the regional water systems, �Gulf Water Company Texas
Hospitals:
22 hospitals in India
Power and electricity companies:
Rapak Energy
Among our Customers
Recognitions
The Technology
Monitor Mode
Every process and every library file that loads is recorded
The system takes their MD5 and SHA signature
Every access of a process to another process is recorded
Maps All Activities in the Organization
Our Detection- Doesn't Miss Any New Attack
Our Detection (2) - Zero Trust
Installed - 3,000
Active – 2,000
Uses network resources- 1,000
malicious
50
Unknown 100
IT manager gets the whole service from Cyber 2.0
Our Prevention - Continues protecting
Infected computer
Uninfected computer
Approved
Not approved
Port 80
Port 80
Scramble
Port 10,000
Approved outgoing traffic is scrambled
Not Scramble
Port 80
Not approved outgoing traffic is not scrambled
Descramble
Port 80
All incoming traffic (approved and not approved)
is descrambled
Descramble
Port 4800
The technology: Chaos Algorithm
Every Attack Against Cyber 2.0
Will fail
4. Malicious software using other software
3. Adding malicious software to the list
2. Deactivating Cyber 2.0
1. Bypassing Cyber 2.0
5. Man in the middle
Uninfected computer
Approved
Scramble
Descramble
Not approved
Descramble
Not Scramble
Port 80
Port 80
Port 4800
Port 80
Port 10,000
Port 80
1. Bypassing Cyber 2.0 Will Fail
Not approved software will still go out with the original port number
Infected computer
Infected computer
Uninfected computer
Approved
Descramble
Not approved
Descramble
Port 80
Port 80
Port 4800
Port 80
Port 80
Port 4800
2. Deactivating Cyber 2.0 Will Fail
All software will go out with the original port number
Cyber 2.0
was removed
Infected computer
Uninfected computer
Approved
Scramble
Descramble
Not approved
Descramble
Not Scramble
Port 80
Port 5800
Port 2000
Port 80
Port 5800
Port 2000
3. Adding Software to The List Will Fail
Changing the list breaks the chaos balance between computers,
and the system will allocate incorrect port number
Outlook
Out to Network
Current cyber solutions
Malicious software activates a chain of legitimate software, that eventually gives a seemingly legitimate command. Cyber systems�will not block Outlook from going out to the network
Cyber 2.0 - Reverse tracking
Our mechanism tracks the chain all the way back, using Reverse Tracking Technology, and blocks Outlook from going out to the network
4. Malicious Software Using Other
Software Will Fail
Malicious Software
Command
Svchost
Command
Task Scheduler
Command
Power Shell
Command
Command
Reverse Tracking
Process 1
Process 2
Process 3
Process 4
Out to Network
Every process and every library file that loads is recorded
The system takes their MD5 and SHA signature
Every access of a process to another process is recorded
Doesn't Miss Any New Attack
The Advantages of this Process
A dedicated Gateway is deployed between the network and Firewall / various unsupported network devices
Infected computer
Approved
Scramble
Not Approved
Not Scramble
80
80
INTERNET
OK
Descramble
Descramble
80
10,000
Vortex�Gateway
Firewall
4800
80
Vortex Gateway for Firewall
The Patents
Step 2 – Solution for OT2
OT
Our Solution for OT
OT
Cyber 2.0 for OT environments prevents cyber-attacks from
reaching the controllers, and spreading through the network
Infected computer
Approved
Scramble
Not Approved
Not Scramble
80
80
4800
80
Descramble
Descramble
80
10,000
OT�Gateway
Switch/Controller
Vortex Gateway for the OT/IOT World
OT
Every Attack Against Cyber 2.0
Will fail
4. Malicious software using other software to attack protected device
3. Adding malicious software to the trust list
2. Attacking protected device from authorized computers
1. Direct attack on Protected Device
OT
1. Direct attack on Protected Device
External computer
Not Approved
Not Scramble
80
4800
80
Descramble
Descramble
80
10,000
OT�Gateway
Switch/Controller
Control computer
Approved
Scramble
80
OT
2. Attacking protected device from authorized computers
Infected computer
Approved
Scramble
Not Approved
Not Scramble
80
80
4800
80
Descramble
Descramble
80
10,000
OT�Gateway
Switch/Controller
OT
Infected computer
Approved
Scramble
Not Approved
Not Scramble
80
80
2200
2200
Descramble
Descramble
5800
5800
OT�Gateway
Switch/Controller
3. Adding Software to The List Will Fail
Changing the list breaks the chaos balance between computers,
and the system will allocate incorrect port number
OT
HMI
Out to Network
Current cyber solutions
Malicious software activates a chain of legitimate software, that eventually gives a seemingly legitimate command. Cyber systems�will not block Outlook from going out to the network
Cyber 2.0 - Reverse tracking
Our mechanism tracks the chain all the way back, using Reverse Tracking Technology, and blocks Outlook from going out to the network
4. Malicious Software Using Other
Software Will Fail
Malicious Software
Command
Power Shell
Command
Command
OT
OT Full Protection in a Closed Environment
OT Gateway
control computer
control computer
control computer
Network Switch
A single gateway
Controller
Controller
Controller
Controller
Controller
OT
OT Gateway
control computer
control computer
control computer
Network Switch
Multiple gateways
Controller
Controller
Controller
Controller
Controller
OT Gateway
OT Gateway
OT Gateway
OT Gateway
OT Full Protection in a Widespread Environment
OT
Sneer Rosenfeld
Hertzel Ozer
Erez Kaplan Haelion
Founder & Chairman of the board
CEO
Founder & CTO
Senior Advisor of Microsoft
Well-experienced Manager
Chairman of the Board of few large companies such as HOT Telecommunication System
The Team
Guy Tessler
Tanya Sarel
Sai Krishna
COO
USA Business Development VP
Manager - India
Founder of Global Cyber Security Forum
Experience Managing Partner, GOT Group – Atlanta, GA
HR Recruiter at Check Point Software Technologies
Col. (Ret.) Adi Bershadsky
Professor Bryson R. Payne
Advisory Board
Advisory Board
Former military attaché in Europe
Tenured Professor of Computer Science
Major Gen. (Res.) Yitzhak (Jerry) Gershon
Advisory Board
Chairman of the Israel Airports Authority
Professor Lewi Stone, Ph.D. - Advisory Board
Advisory Board
Expert of mathematical modelling of chaotic systems
Advisory Board
Major Gen. (Res.) Professor Isaac Ben Israel
Advisory Board
The initiator of the National Cyber Authority at the Prime Minister's Office in Israel
www.cyber20.com
info@cyber20.com
+972-77-5438441
Contact Us