Cyber 2.0 introduces a revolution in two fields of cyber defense. In the IT field (computer networks), the company exposes the weaknesses of cyber giants and, for the first time, proves that it prevents the spread of cyberattacks that all of the organization’s existing defense systems together failed to stop.

In the OT field (which includes critical infrastructures such as controllers, dams, traffic lights, and factories) and IoT (devices connected to the internet such as cameras), the company presents the only system in the world that does not focus only on detection, like all the other companies, but actually prevents the spread of cyberattacks to industrial controllers.

In the IT field: Every cyber company claims that its solution is the best, but until today there were no tools on the market that allowed these claims to be thoroughly examined. Even professional evaluations do not provide metrics that can truly be tested in a non-refutable way.  Now, Cyber 2.0 is releasing a revolutionary AI-based report that is generated for every customer.

This report presents all the malware that actually managed to leave the infected computer (as well as all the vulnerable applications through which attackers tried to carry out an attack), after bypassing all the cybersecurity systems installed in the organization, and attempted to spread to the rest of the organization’s computers.

The report includes full details such as the name of the malware that moved through the organization, from which computer it left, when, and to which computer it tried to penetrate. It allows the customer to check and see for themselves that these dangerous programs indeed bypassed the other protection systems installed, and that their spread was stopped by Cyber 2.0 before they entered the target computer.

Cyber 2.0 effectively challenges all the leading cybersecurity companies - including Check Point, Palo Alto Networks, CrowdStrike, Kaspersky, Fortinet, SentinelOne, Trend Micro, ESET, McAfee, Cybereason, and others.  The company claims that a large portion of the money organizations pay these companies is actually wasted on systems that do not stop many cyberattacks.

In the OT & IoT field: All other companies are limited to trying to detect attacks (Detection), without the ability to truly prevent them (Prevention). The reason is that prevention requires installing software on the controllers (which poses a risk to their operation), requires internet connectivity, continuous updates, and more.  Even if companies tried to implement prevention, they would attempt to handle the malware only after it reached the controllers.

Cyber 2.0 changes this paradigm: In addition to detection, it also performs prevention. It does this without installing anything on the controllers, operates even in environments that are not connected to the internet, and prevents attacks before they reach the controllers.

Every cyberattack that is made public is in fact an attack that bypassed all existing defense systems, without exception, and therefore testifies to the failure of all cyber companies to stop it. The actual number of cyberattacks is many times higher than reported. The main reason is that most attacks are not detected by organizations, as they focus on collecting information, locating vulnerabilities, and siphoning off computing power for other purposes.  Another reason is that organizations tend not to report attacks they suffer, partly because they do not want to be seen as failing to protect themselves properly.

The difference between Cyber 2.0 and other systems: Other systems naturally try to prevent malware from infiltrating one of the organization’s computers and, after infiltration, from spreading to the others. In contrast, Cyber 2.0 acts in the opposite way: Not only does it not prevent these programs from leaving the infected computer, it actually allows them to leave freely.

Instead, it prevents them from entering the other computers in the organization. Paradoxically, precisely because they leave the infected computer, they are blocked at the receiving computer. Therefore, by definition, every attack stopped by Cyber 2.0 on the target computer is an attack that originated from an infected computer after it successfully bypassed all the cybersecurity systems installed on it.

The analogy the company uses is that of a soccer game: Every ball stopped by the goalkeeper is a ball that none of the defenders managed to stop. Just as no soccer team would give up its goalkeeper, even if it could give up one defender or another - so too, an organization may give up one cyber defense solution or another, but cannot afford to give up Cyber 2.0, which is its last line of defense.

Cyber 2.0 stated: “In the IT field, this is a groundbreaking move that for the first time allows the world to hold up a mirror to the leading cyber companies and expose their weaknesses, by presenting the list of all the malware that they failed to stop from spreading within their customers’ organizations - compared to Cyber 2.0, which blocks them.  In the infrastructure (OT) field, the move is even more dramatic: The Cyber 2.0 system is the only solution in the world that not only deals with threat detection, but provides real protection.”