1 of 36

Prevents the spread of cyber-attacks

2 of 36

Thousands of Cyber Systems on the market

All together < 100% defense

EDR, MDR , XDR, Monitoring

IDS, IPS, NAC, SOC

Weaknesses Identification

IR, Vlans, Consulting Services

Forensics, Gateway

Antivirus

Next Gen Antivirus,

Firewall

Next-Generation Firewall

DDos protection

Vaults, Network Mapping

Data Recovery, Phishing

Penetration Test, Events

Anal sis Sandbox, Spam

floodgates

proxies, Safebox, Packet Filter

Circuit-Level Gateway

Stateful Application Firewall

Application-Level Threat-Focused …..…

3 of 36

The Problem We Solve

The main damage is the spread of cyber-attacks across the organization

We provide total defense against

the spreading of all cyber-attacks

including new and unknown ones

within and outside the organizational network

We focuses only on that and do it better than any other Cyber company

4 of 36

Detection

Prevention

First they try to detect and recognize

every malicious software

Then try to prevent its spreading

within the organizational network

They can’t ensure 100% Detection

Because of new malicious software every second

How Other Companies Act

They can’t really ensure a complete solution:

They can’t ensure 100% Prevention

Because they can’t prevent the spread of

any malware that they didn’t detect

and because hackers can remove the defense systems

5 of 36

Cyber 2.0 Provides Full Solution

Doesn’t miss any new

cyber-attack

The system continues protecting even if being removed

Detection

Total Prevention

6 of 36

Cyber 2.0 Solution

We only define which programs are allowed to move on the network

we do not prevent malware from going out of the infected computer

The technology: Zero Trust

The technology: Chaos Algorithm

Detection

Prevention

Anything that has not been defined as such,

including any new software - will be blocked

Therefore, even if hackers have removed our protection from that infected computer, our system continues to prevent the spread of cyber-attacks from it.

Our blocking is done on the computers to which

the malware was sent

Actually, we do the opposite, we allow it to go out

7 of 36

is based on

mathematical chaos model

is based on

biological models

The Cyber World

The Chaos Model

Cyber 2.0 is protected by 9 patents

that are vulnerable to attacks

by systems using similar models (hence where the terminology virus and anti-virus comes from)

that can’t be breached

(Not even by us)

8 of 36

  • 5 years
  • 8,000 hackers
  • $ 100,000 Reward

Unhackable System

They all failed

9 of 36

Ports:

Ashdod, The Israeli largest port,�Thessaloniki Port

Water Systems

: Mekorot,The National water company of Israel, 60% of the regional water systems, �Gulf Water Company Texas

Hospitals:

22 hospitals in India

Power and electricity companies:

Rapak Energy

Among our Customers

10 of 36

Recognitions

11 of 36

The Technology

12 of 36

Monitor Mode

Every process and every library file that loads is recorded

The system takes their MD5 and SHA signature  

Every access of a process to another process is recorded

Maps All Activities in the Organization

Our Detection- Doesn't Miss Any New Attack

13 of 36

Our Detection (2) - Zero Trust

  • Maps all active software (2000)
  • Removes/blocks malicious (50)
  • Reflects unknown (100)
  • approves (850)
  • Moves to Defense-Mode and blocks all the rest (including every new software and virus, every 0-Day and every dormant software)�

Installed - 3,000

Active – 2,000

Uses network resources- 1,000

malicious

50

Unknown 100

IT manager gets the whole service from Cyber 2.0

14 of 36

Our Prevention - Continues protecting

Infected computer

Uninfected computer

Approved

Not approved

Port 80

Port 80

Scramble

Port 10,000

Approved outgoing traffic is scrambled

Not Scramble

Port 80

Not approved outgoing traffic is not scrambled

Descramble

Port 80

All incoming traffic (approved and not approved)

is descrambled

Descramble

Port 4800

The technology: Chaos Algorithm

15 of 36

Every Attack Against Cyber 2.0

Will fail

4. Malicious software using other software

3. Adding malicious software to the list

2. Deactivating Cyber 2.0

1. Bypassing Cyber 2.0

5. Man in the middle

16 of 36

Uninfected computer

Approved

Scramble

Descramble

Not approved

Descramble

Not Scramble

Port 80

Port 80

Port 4800

Port 80

Port 10,000

Port 80

1. Bypassing Cyber 2.0 Will Fail

Not approved software will still go out with the original port number

Infected computer

17 of 36

Infected computer

Uninfected computer

Approved

Descramble

Not approved

Descramble

Port 80

Port 80

Port 4800

Port 80

Port 80

Port 4800

2. Deactivating Cyber 2.0 Will Fail

All software will go out with the original port number

Cyber 2.0

was removed

18 of 36

Infected computer

Uninfected computer

Approved

Scramble

Descramble

Not approved

Descramble

Not Scramble

Port 80

Port 5800

Port 2000

Port 80

Port 5800

Port 2000

3. Adding Software to The List Will Fail

Changing the list breaks the chaos balance between computers,

and the system will allocate incorrect port number

19 of 36

Outlook

Out to Network

Current cyber solutions

Malicious software activates a chain of legitimate software, that eventually gives a seemingly legitimate command. Cyber systems�will not block Outlook from going out to the network

Cyber 2.0 - Reverse tracking

Our mechanism tracks the chain all the way back, using Reverse Tracking Technology, and blocks Outlook from going out to the network

4. Malicious Software Using Other

Software Will Fail

Malicious Software

Command

Svchost

Command

Task Scheduler

Command

Power Shell

Command

Command

  • Outlook sends legitimate emails according to legitimate commands�
  • If or when Outlook has been compromised by hackers, every cyber defense company will detect it
  • But the hackers are sophisticated - they embed malware, using other legitimate software

20 of 36

Reverse Tracking

Process 1

Process 2

Process 3

Process 4

Out to Network

Every process and every library file that loads is recorded

The system takes their MD5 and SHA signature  

Every access of a process to another process is recorded

Doesn't Miss Any New Attack

21 of 36

The Advantages of this Process

  • We don’t read data�
  • Our solution complies with the Regulation and the GDPR�(Privacy Protection Regulations)�
  • We don’t create a load on the systems, nor do we slow down the network�
  • No software updates are required

22 of 36

A dedicated Gateway is deployed between the network and Firewall / various unsupported network devices

Infected computer

Approved

Scramble

Not Approved

Not Scramble

80

80

INTERNET

OK

Descramble

Descramble

80

10,000

Vortex�Gateway

Firewall

4800

80

Vortex Gateway for Firewall

23 of 36

  • Unique Scrambling System- chaos engine (approved US 9,838,368, US 10,313,318)
  • Unique Server Support System (approved US 9,794,277, US 9,985,981, US 10,333,956)
  • Reverse Tracking Technology System (approved US 10,616,231)
  • Creating multiple Vlans without the use of hardware (approved US 10,397,196)
  • Unique Gateway System (submitted)
  • Reverse Chaos for employees who work at home (submitted)
  • Rendering Reverse Engineering ineffective (in process)
  • Automatic creation of dynamic lists (in process)
  • Chaos SSL (in process))

The Patents

24 of 36

Step 2 – Solution for OT2

OT

25 of 36

  • Marking the only 1-5 approved programs
  • No need to install over the controller
  • Works in unconnected networks
  • Does not require any updates

Our Solution for OT

OT

Cyber 2.0 for OT environments prevents cyber-attacks from

reaching the controllers, and spreading through the network

26 of 36

Infected computer

Approved

Scramble

Not Approved

Not Scramble

80

80

4800

80

Descramble

Descramble

80

10,000

OT�Gateway

Switch/Controller

Vortex Gateway for the OT/IOT World

OT

27 of 36

Every Attack Against Cyber 2.0

Will fail

4. Malicious software using other software to attack protected device

3. Adding malicious software to the trust list

2. Attacking protected device from authorized computers

1. Direct attack on Protected Device

OT

28 of 36

1. Direct attack on Protected Device

External computer

Not Approved

Not Scramble

80

4800

80

Descramble

Descramble

80

10,000

OT�Gateway

Switch/Controller

Control computer

Approved

Scramble

80

OT

29 of 36

2. Attacking protected device from authorized computers

Infected computer

Approved

Scramble

Not Approved

Not Scramble

80

80

4800

80

Descramble

Descramble

80

10,000

OT�Gateway

Switch/Controller

OT

30 of 36

Infected computer

Approved

Scramble

Not Approved

Not Scramble

80

80

2200

2200

Descramble

Descramble

5800

5800

OT�Gateway

Switch/Controller

3. Adding Software to The List Will Fail

Changing the list breaks the chaos balance between computers,

and the system will allocate incorrect port number

OT

31 of 36

HMI

Out to Network

Current cyber solutions

Malicious software activates a chain of legitimate software, that eventually gives a seemingly legitimate command. Cyber systems�will not block Outlook from going out to the network

Cyber 2.0 - Reverse tracking

Our mechanism tracks the chain all the way back, using Reverse Tracking Technology, and blocks Outlook from going out to the network

4. Malicious Software Using Other

Software Will Fail

Malicious Software

Command

Power Shell

Command

Command

  • Outlook sends legitimate emails according to legitimate commands�
  • If or when Outlook has been compromised by hackers, every cyber defense company will detect it
  • But the hackers are sophisticated - they insert malware, using other legitimate software

OT

32 of 36

OT Full Protection in a Closed Environment

OT Gateway

control computer

control computer

control computer

Network Switch

A single gateway

Controller

Controller

Controller

Controller

Controller

OT

33 of 36

OT Gateway

control computer

control computer

control computer

Network Switch

Multiple gateways

Controller

Controller

Controller

Controller

Controller

OT Gateway

OT Gateway

OT Gateway

OT Gateway

OT Full Protection in a Widespread Environment

OT

34 of 36

Sneer Rosenfeld

Hertzel Ozer

Erez Kaplan Haelion

Founder & Chairman of the board

CEO

Founder & CTO

Senior Advisor of Microsoft

Well-experienced Manager

Chairman of the Board of few large companies such as HOT Telecommunication System

The Team

Guy Tessler

Tanya Sarel

Sai Krishna

COO

USA Business Development VP

Manager - India

Founder of Global Cyber Security Forum

Experience Managing Partner, GOT Group – Atlanta, GA

HR Recruiter at Check Point Software Technologies

35 of 36

Col. (Ret.) Adi Bershadsky

Professor Bryson R. Payne

Advisory Board

Advisory Board

Former military attaché in Europe

Tenured Professor of Computer Science

Major Gen. (Res.) Yitzhak (Jerry) Gershon

Advisory Board

Chairman of the Israel Airports Authority

Professor Lewi Stone, Ph.D. - Advisory Board

Advisory Board

Expert of mathematical modelling of chaotic systems

Advisory Board

Major Gen. (Res.) Professor Isaac Ben Israel

Advisory Board

The initiator of the National Cyber Authority at the Prime Minister's Office in Israel

36 of 36

www.cyber20.com

info@cyber20.com

+972-77-5438441

Contact Us