If you have a question that you don’t see answered here, feel free to reach out and we’ll do our best to help clarify things for you.
Our competitors try to predict what cyber criminals will do next. That’s extremely difficult to do, especially since they tend to work in large, highly organized, highly sophisticated, international crime rings. Unfortunately, as we keep seeing in the news, ransomware attacks are on the rise, with no end in sight.
CYDEF is different because we review all the activity on your devices and confirm if it’s safe and expected. Our team of experts analyze anything that doesn’t meet those criteria, and we respond swiftly to protect your business.
In other words, instead of looking for a needle in a haystack, we’re inspecting each piece of hay to ensure it’s really hay. For example: If a PDF file wants to install an .exe file, that’s unusual and unexpected, and would get flagged for review by an analyst. The PDF file itself may look safe to our competitors, but what it’s trying to do is not.
Our list of safe activities grows exponentially with every device we protect, benefiting all CYDEF clients.
This unique approach, along with our combination of machine learning and human analysis, makes our solution truly revolutionary.
Our solution can detect malware that evades firewalls and anti-virus, such as policy violations, misconfigurations, phishing, zero-day exploits, crypto mining, living off the land attacks, potentially unwanted programs (PUPs), espionage, and of course, ransomware and more. If it’s not something we would expect to see in a normal business environment, it will be investigated by our cyber threat hunters.
Our solution identifies threats that evade firewalls and anti-virus. This includes policy violations, crypto mining, ransomware, and espionage. AV can only prevent attacks from malicious software that it has previously encountered. Any never-before-seen attacks (known as “zero-day” attacks) can slip right through.
Sadly, every business is at risk. Cyber criminals use your devices to conduct illegal activity, hold your data hostage, and spread their malware to others (including your clients). The SolarWinds Supply Chain attack of 2020 is a perfect example. Criminals used SolarWinds to infect thousands of other organizations.
And they aren’t only targeting large enterprises. If you have computers connected to the Internet and data that is valuable to you, your staff, or your clients — you’re at risk.
It’s no longer a matter of if a business will be breached, it’s when.
We get it. That sounds like fear mongering.
But sadly, it’s true. In fact, cyber insurance companies no longer offer $10 million policies for that very reason. And even the insurance companies themselves are not immune.
So don’t wait until it’s too late. Contact us today to protect your business with a simple, effective solution that won’t break the bank.
Sadly, repeat attacks are very common. In fact, 80% of ransomware victims suffer repeat attacks. Typically, repeat attacks happen 12-13 months apart. Cyber criminals know that most people make this assumption and don’t make any changes to their cybersecurity profile. So they give your business just enough time to recover before they come after you again.
The only thing you need is a business email address. You don’t need a credit card and you won’t be asked to sign a contract. Simply fill out the form with your business email and we’ll send you what you need.
Our system is compatible with most other cybersecurity solutions, so it shouldn’t be a problem. After submitting the form, one of our representatives will be in touch and they can assist you with the specifics at that time.
All data processing is done in the cloud, so the impact on your system is minimal. Bandwidth varies by usage but is approximately 3 GB/mo/device.
Minimum technical requirements
- System resources: 2GB RAM, 1GB in disk space
- Internet access with ports 443, 5671 and 5672 open between the agent and the Internet*
- Bandwidth: approx. 3 GB/mo/device (varies)
- Windows 11, 10, Vista, 8, 7 SP1. Windows Server 2019, 2016, 2012 R2 & 2008 R2
- .NET Framework v4.6.1, Sysmon v10.42, WMF (Powershell) v5.1, TLS v1.2
- * Windows 7 requires port 1883 to Microsoft
Mac:
- macOS: Catalina 10.15+
Linux:
Linux Servers operate on many different variants and distributions. As a general rule, CYDEF aims to offer support whenever possible, especially for modern builds. For the best results, please provide your list of in use versions to the CYDEF customer success team and they will be happy to reply back with the support status.
We currently support distributions built with Ubuntu v18 or higher, Red Hat RHEL 7 or higher, Kali 2022, Majaro 19 or higher and any distribution such as Arch Linux built with the Linux Kernel 5 or higher.
There may be cases where a specific installation on Linux will require some technical assistance from CYDEF in order to succeed. CYDEF is happy to provide this assistance free of charge for any of the above supported platforms.