top of page


Cyber 2.0 allows easy identification and control of all applications, malicious or otherwise, on the network with point and click management.


Network communication by approved applications is scrambled using unbreakable chaos algorithms.

Every process, every library and file that loads is recorded. Every access
of a process to another process is recorded creating a “Chain Kind” of
the applications, if there is an unapproved application the “Chain” will
be blocked from communicating over the network.

Cyber 2.0's mechanism tracks the chain all the way back, using Reverse Tracking Technology and blocks Outlook from going out to the network

bottom of page