Overview

All components of CloudCyte is based on virtualized containers enabling unlimited scalability without requiring complex resource planning. Deployment on any Kubernetes based platform including Amazon Web Services, Microsoft Azure and Google Cloud is supported. The system offers two modules.
DNS Security
CloudCyte DNS Security handles the DNS requests from users and redirects malicious requests to a sinkhole providing a new layer of security with artificial intelligence.
Classification of Internet activity in seconds.
Block data exfiltration attacks utilizing DNS Tunneling.
Protect users against ransomware, malware, phishing, and botnet threats.
Only permit categorized Internet traffic to enable reliable protection from zero-day attacks.
Perform gap-analysis for the the existing security infrastrucuture by automated tracking of internal DNS Server logs and external DNS requests from the organization.
Provide rule-based SIEM integration for lowering the EPS levels from DNS logs. A 1:1000 suppression is achieved by only sending selected logs based on category.
Ability to integrate with Microsoft DNS servers, F5 Big-IP DNS servers, Citrix Netscaler DNS Servers and any other kind of DNS to provide support for agentless operation.
E-mail Security
CloudCyte provides a complete view of threats arising from phishing attacks. The users can report e-mails that they think is suspicious. Machine-learning based classification algorithm provides an extensive real-time view into threats. The platform provides unmatched visibility for malicious e-mails reaching the end-users. Once an e-mail is identified as malicious, the system can delete the e-mail from all user mailboxes.
Phishing simulation and user awareness training are also provided as built-in modules to enable organizations to prepare better for phishing attacks.
Identification of targeted phishing attacks bypassing the existing security controls.
Enable automated actions for malicious e-mails.
GDPR compliance by performing analysis based on the metadata collected from the e-mails.
Increased user awareness.
The Microsoft Outlook add-in scans every e-mail for threats and protect the user within the e-mail application for a better user experience and increased productivity.
The threat analysis is performed in the user mailbox enabling significantly less resource consumption.
By providing feedback to the end-user, the module provides better interaction with the user.
CloudCyte for MSSP’s
White-labelling support for all components to enable better MSSP brand visibility.
Deployment on any Kubernetes supporting cloud platform including Amazon WS, Microsoft Azure and Google.
Ability to enroll and initiate customers in minutes.
Full support for self-management and customer tracking.
Enable self-deployment and zero maintenance overhead.
Core Strengths
Three Stage unprecedented deployment system for enhanced user experience.
Single platform for endpoint and e-mail security covering both personal and business devices.
Complete data privacy.
Ability to perform gap analysis for the existing security infrastructure to address the compliance requirements.
Flexible pricing models for different needs.
Supported Platforms
– Windows 8.1 +
– MAC OS Sierra +
– IOS 10 +
– Android 10 +
– Windows 2016 +
– Microsoft Exchange Server 2016 +
– Microsoft Office 365

