Based on data collected from different sources by our team,
there are indicators that suggest that this company is no longer active. However, this information may not be accurate.
If you believe this information should be updated, please .
For more details, you can read our .
Cyber 2.0 provides defense against the spread of cyber attacks within organizational networks. The company's solution is suitable for IT, OT, and connected vehicles.
Cyber 2.0 is based on a mathematical chaos model. The system performs continuous mapping of all software, marking approved software to move across the organizational network and blocking anything that is not marked as such (including new viruses).
Instead of trying to prevent attacks, the system allows the malware to go out of the infected computer and move across the network. Therefore, even if attackers bypass or remove the Cyber 2.0 system from the infected computer, the malware will still go out in the way the system has set it up.