Israel Maritime Cybersecurity Summit

Поделиться
HTML-код
  • Опубликовано: 2 окт 2024
  • Sneer Rozenfeld is presenting the Cyber 2.0 solution
    at the Israel Maritime Cybersecurity Summit which was held at the Ashdod port on the 22/7/21
    in this Video we are presenting our Unique Zero trust technology
    and the project we implemented at the Ashdod Port
    CYBER 2.0 - TOTAL DEFENSE AGAINST THE SPREAD OF CYBER ATTACKS
    Cyber 2.0 (founded in 2015) has developed a disruptive cyber-security technology.
    It is the only system in the world that provides total defense against the spread of cyber attacks within organizational networks. (viruses, ransomware, Trojan, information leakage, browser hijacking, and every new attack)
    The first computer may be penetrated, but Cyber 2.0 will isolate the attack and block its spreading. The infected computer will also be blocked from sending information outside the organization, even if it was infected before the installation of Cyber 2.0
    Too good to be true?
    • We announced The biggest hackers challenge;
    June 2018 -Israel; Reward = NIS 100,000.
    February 2019 Atlanta; Reward = $ 100,000.
    March ,2019 Worldwide; Nonstop, open to all, every month a bigger reward
    • We have many satisfied clients in process of implementation.
    • Cyber 2.0 Registered 9 Patents.
    • We are supported by the Israel Innovation Authority.
    Cyber 2.0 system is based on a mathematical chaos model that cannot be breached.
    Cyber 2.0 does not fail the Detection Test, because it skips over it, effectively blocking every malware without first identifying it.
    Cyber 2.0 does not fail the Prevention Test, because by using the chaos model, it blocks 100% of what needs to be blocked, since it is designed in a way that even if it is bypassed or deactivated, it still protects the organization.
    Unlike other systems: We don’t study the organization’s routine, we don’t
    use attack database, we don’t look for anomalies, we don’t legitimize previous malicious programs, we don’t rely on the infected computer, we don’t have false positives or delayed response to real threats. Our system does not require any updates.
    Cyber 2.0 system provides total solution for the IT and OT world
  • НаукаНаука

Комментарии •