All data processing is done in the cloud, so the impact is minimal. Bandwidth varies by usage but is approximately 3 GB/mo/device.
Minimum technical requirements System resources: 2GB RAM, 1GB in disk space Internet access with ports 443, 5671 and 5672 open between the agent and the Internet* Bandwidth: approx. 3 GB/mo/device (varies) Windows: Windows 11, 10, Vista, 8, 7 SP1. Windows Server 2019, 2016, 2012 R2 & 2008 R2 .NET Framework v4.6.1, Sysmon v10.42, WMF (Powershell) [...]
Our system is compatible with most other cybersecurity solutions, so it shouldn't be a problem. After submitting the form, one of our representatives will be in touch and they can assist you with the specifics at that time.
Sadly, repeat attacks are very common. In fact, 80% of ransomware victims suffer repeat attacks. Typically, repeat attacks happen 12-13 months apart. Cyber criminals give your business just enough time to recover before they come after you again.
Our competitors try to predict what cyber criminals will do next. That’s extremely difficult to do, especially since they tend to work in large, highly organized, highly sophisticated, international crime rings. Unfortunately, as we keep seeing in the news, ransomware attacks are on the rise, with no end in sight. CYDEF is different because we [...]
Our solution identifies threats that evade firewalls and anti-virus. This includes policy violations, crypto mining, ransomware, and espionage. AV can only prevent attacks from malicious software that it has previously encountered. Any never-before-seen attacks (known as “zero-day” attacks) can slip right through. Sadly, every business is at risk. Cyber criminals use your devices to conduct [...]