What’s NOT included in this offer?
This offer is only for our flagship product, SMART-Monitor. It does not include Anti-Virus, Cybersecurity Awareness Training, Professional Services, or any other products and services we offer.
This offer is only for our flagship product, SMART-Monitor. It does not include Anti-Virus, Cybersecurity Awareness Training, Professional Services, or any other products and services we offer.
Minimum technical requirements: System resources: 2GB RAM, 1GB in disk space Internet access with ports 443, 5671 and 5672 open between the agent and the Internet* Bandwidth: approx. 3 GB/mo/device (varies) Windows: Windows 11, 10, Vista, 8, 7 SP1. Windows Server 2019, 2016, 2012 R2 & 2008 R2 .NET Framework v4.6.1, Sysmon v10.42, WMF (Powershell) [...]
Our solution can detect malware that evades firewalls and anti-virus, such as policy violations, misconfigurations, phishing, zero-day exploits, crypto mining, living off the land attacks, potentially unwanted programs (PUPs), espionage, and of course, ransomware.
Activity data is securely transmitted to CYDEF servers. Personal client data is not collected, collection activity is restricted to event log files and meta data (e.g. file name, command line, event id). All collected data is encrypted in transit (TLS1.2) and at rest (AES-256 with key rotation).
It is a continuous process. The solution is intelligent enough to know if the connection is broken and identify the last timepoint of data transfer. When the connection is re-established, it will know when the last transmission occurred and will provide all the data from that point onwards.
Over the course of six months, we worked with Canada’s Centre of Excellence in Next Generation Networks (CENGN) to prove that our architecture scales successfully beyond 100,000 devices. With this knowledge, we have developed a clear path to scale into the millions of devices.
Customer portal access is provided so reports can be accessed in real time 24/7.
What really sets us apart is our approach to identifying attacks. Our competitors look exclusively for threats based on known patterns, much the same as anti-malware solutions do. Our technology analyzes the activities on your endpoints and validates if it is what we would expect to see in a normal business environment. If not, our [...]
We would be happy to send you pricing information. Please start by completing the form on this page.
For this offer, we are requiring a minimum of 10 devices, with no maximum. You can install it on as many devices as you have. Twenty? No problem. Twenty thousand? Fine by us.