What are the minimum technical requirements?

Minimum technical requirements System resources: 2GB RAM, 1GB in disk space Internet access with ports 443, 5671 and 5672 open between the agent and the Internet* Bandwidth: approx. 3 GB/mo/device (varies) Windows: Windows 11, 10, Vista, 8, 7 SP1. Windows Server 2019, 2016, 2012 R2 & 2008 R2 .NET Framework v4.6.1, Sysmon v10.42, WMF (Powershell) [...]

By |2022-01-31T17:14:47-05:00October 27, 2021|, , , |

How is CYDEF different?

Our competitors try to predict what cyber criminals will do next. That’s extremely difficult to do, especially since they tend to work in large, highly organized, highly sophisticated, international crime rings. Unfortunately, as we keep seeing in the news, ransomware attacks are on the rise, with no end in sight. CYDEF is different because we [...]

By |2022-01-31T17:15:51-05:00October 27, 2021|, , |

Why do I need cybersecurity if I have a firewall and anti-virus program?

Our solution identifies threats that evade firewalls and anti-virus. This includes policy violations, crypto mining, ransomware, and espionage. AV can only prevent attacks from malicious software that it has previously encountered. Any never-before-seen attacks (known as “zero-day” attacks) can slip right through. Sadly, every business is at risk. Cyber criminals use your devices to conduct [...]

By |2022-01-31T17:16:11-05:00October 27, 2021|, , |
Go to Top