Secure. Protect. Defend.
CyberRock Protects Mission Critical Systems and Cyber Infrastructure from Unknown Cyber Threats in True Real -Time
Almost all existing cyber defense mechanisms, such as firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPD), and anti-malware systems, are based on the incomplete knowledge of what is wrong. Such approaches have been shown to be ineffective when facing zero-day attacks and advanced persistent threats (APT) and they are simply unable to handle the sheer number (e.g., 1 million) of new malware variants appeared every day.
One of the greatest fears of all perpetrators is the risk of being caught. As a result, cyber criminals often use publicly available low-latency anonymity systems (e.g., Tor, anonymizer.com) to conceal their illicit cyber activities, their true location and identity. In order to deter cyber crimes, we need accurate and reliable attribution capabilities to identify and track illicit cyber activities across anonymous networks to their source. Such a cyberattack attribution capability opens a broad range of cyberattack response options that would significantly improve the cyber security of our mission critical systems and cyber infrastructure.
Instead of learning and using the incomplete knowledge of what is wrong, CyberRock Inc. is building revolutionary cyber defense capabilities based on specific knowledge of what is right. Since our cyber defense does not require any specific knowledge of what is wrong, it is effective on previously unknown cyberattacks such as zero-day attacks and advanced persistent threats.
Built upon research breakthroughs and patented technologies, CyberRock Inc. is developing and delivering the following unprecedented cyber defense capabilities
- Immunization based cyber defense systems to provide true real-time protection of mission critical systems and networks from previously unknown cyberattacks
- Real-time and automated cyberattack attribution capability that can reliably identify and track encrypted and anonymized traffic (e.g., Tor) across the Internet.
- Transparently identify and track encrypted attack flows across low-latency anonymity networks (e.g., Tor) in real-time