All data processing is done in the cloud, so the impact is minimal. Bandwidth varies by usage but is approximately 3 GB/mo/device.
Minimum technical requirements System resources: 2GB RAM, 1GB in disk space Internet access with ports 443, 5671 and 5672 open between the agent and the Internet* Bandwidth: approx. 3 GB/mo/device (varies) Windows: Windows 11, 10, Vista, 8, 7 SP1. Windows Server 2019, 2016, 2012 R2 & 2008 R2 .NET Framework v4.6.1, Sysmon v10.42, WMF (Powershell) [...]
Our system is compatible with most other cybersecurity solutions, so it shouldn't be a problem. After submitting the form, one of our representatives will be in touch and they can assist you with the specifics at that time.
For this offer, we are requiring a minimum of 10 devices, with no maximum. You can install it on as many devices as you have. Twenty? No problem. Twenty thousand? Fine by us.
You’ll receive an email from our team with a link to download our light-weight agent. You’ll need to install that software on every device in your organization. If you only install it on a few devices, you won’t be fully protected… That’s like locking your front door, but leaving all the windows wide open. [...]
The only thing you need is a business email address. You don’t need a credit card and you won’t be asked to sign a contract. Simply fill out the form with your business email and we’ll send you what you need.
Sadly, repeat attacks are very common. In fact, 80% of ransomware victims suffer repeat attacks. Typically, repeat attacks happen 12-13 months apart. Cyber criminals give your business just enough time to recover before they come after you again.
Our competitors try to predict what cyber criminals will do next. That’s extremely difficult to do, especially since they tend to work in large, highly organized, highly sophisticated, international crime rings. Unfortunately, as we keep seeing in the news, ransomware attacks are on the rise, with no end in sight. CYDEF is different because we [...]
Our solution identifies threats that evade firewalls and anti-virus. This includes policy violations, crypto mining, ransomware, and espionage. AV can only prevent attacks from malicious software that it has previously encountered. Any never-before-seen attacks (known as “zero-day” attacks) can slip right through. Sadly, every business is at risk. Cyber criminals use your devices to conduct [...]