Frequently Asked Quetions

Capabilities

What is Cyemptive ZeroStrike?

Cyemptive ZeroStrike is our ability to eliminate damage from attacks pre-emptively, even from unknown attack vectors, pre-zero day discovery.  With Cyemptive ZeroStrike there is no need for recovery and remediation, an industry-first capability. 

What solutions are offered with Cyemptive ZeroStrike capabilities?
Cyemptive ZeroStrike Solutions protect six separate attack surfaces:
 
      Cyemptive Perimeter Fortress
      Cyemptive Zero Trust Access Agent
      Cyemptive Endpoint Fortress
      Cyemptive File Fortress
      Cyemptive Enterprise Scanner
      Cyemptive Application Fortress
      Cyemptive DNS Fortress
      Cyemptive Time Fortress
      Cyemptive SIEM
      Cyemptive Log Fortress
      Cyemptive Enterprise Manager
What is CyberSlice© Technology?

Cyemptive’s patented CyberSlice© technology is used in all of our solutions. CyberSlice© constantly sanitizes key infrastructure elements, keeping those elements in a pristine and predictable state. CyberSlice© minimizes, or even eliminates a hacker’s exploit time, allowing the system to pre-emptively defeat damage from Advanced Persistent Threats, AI, Super and Quantum computing attacks. 

What is Cyemptive CyberScan Technology?

Cyemptive’s CyberScan technology scans, detects, identifies, and stops known and unknown attacks including Malicious Encryption, Sleeper Ransomware, hidden File Executables, Packers, Malware, and Steganography. It employs a unique, micro-segmented platform, providing isolation at multiple layers to prevent malware from executing, bypassing scans, infecting Operating Systems, or infecting core system services.

Can I use Cyemptive solutions to replace my current solution?

Yes, Cyemptive allows organizations to move to a pre-emptive cybersecurity posture elevating protections and eliminating damage without manual remediation.

Can I integrate Cyemptive solutions with other providers?

Yes, Cyemptive has security blueprints that can be deployed in conjunction with other vendor products.

Which products can Cyemptive solutions help me replace?

Cyemptive provides six distinct solution groups ( https://www.cyemptive.com/solutions/ ) and can replace products from other vendors in each of those six solution groups.

Can Cyemptive solutions be used for compliance requirements?

Yes, CyberSlice© is actually an engine that drives automatic compliance for cybersecurity products with automated, hands-off policy deployment.

Can Cyemptive solutions block attacks?

Yes. Cyemptive’s solution sanitizes attacks and eliminates the need for manual remediation.  What is different about Cyemptive ZeroStrike is our ability to defend attacks without having to learn the attack or build a specific defense against that attack.

Integration

Do I need a large staff to maintain my Cyemptive solution environment?
No. For example, we defeat over 250 billion attacks daily against our own infrastructure with a support staff of 4 people. Our systems are self-healing and require very little support. Hardware failures, while rare, would still require human engagement. Staff would be needed to implement and support changes to your environment., and staff would of course be managing other infrastructure security requirements and overseeing cybersecurity strategy.
How do I integrate with Cyemptive solutions?
Cyemptive has customizable security blueprints that can be tailored for your specific requirements. We work with you and your team to develop your personal implementation plan.
Do Cyemptive solutions integrate with my SIEM?

Yes. We also provide our own SIEM. Since our systems are self-protecting and sanitize damage from threats, we eliminate large amounts of noise in the logs themselves. Also, many traditional processes you see in today’s marketplace are not required.

What is the impact on performance (if any) when implementing Cyemptive solutions?

There is no impact on Customers systems and applications.

Does your Technology integrate with Active Directory?

No. Our solutions protect your Active Directory environment, but to ensure their security, as well as the integrity of our own solutions, they are not integrated.

Do your customers have to install agents on their infrastructure systems?

No. We do not rely on the traditional methodology that requires agents. Our solutions have their own sensors and we use a preventative approach rather than post-infection detection.

Deployment

How long does it take to get started with Cyemptive solutions?

We can move as quickly as you like. Our recommendation is that you start with an environment assessment and review, which is accomplished in one week. A recommended plan and detailed topology would result from the assessment phase and would include deployment time estimates. Time to deploy depends on the number of attack surfaces you wish to defend with our technology.

What Microsoft Windows versions does Cyemptive support?

All versions are supported.

Can Cyemptive scale to protect large environments with 100,000+ endpoints?

Yes. We create blueprints for any desired scale.

Does a company need to deploy your entire portfolio all at the same time?

No. It is not a requirement to rip and replace existing solutions. We offer a phased approach with blueprints tailored to your targeted outcome.

Could a bad actor inside an organization submit a malicious policy change request, approve it, and place it into service, bypassing security protocols?

No. We utilize Multi-User Authorization (MUA) and CyberSlice© to ensure that no individual or process can approve their own change. The system will not allow that change to persist. In fact, even if a bad actor had the root password to the operating system of one of our solutions, our technology will sanitize out their malicious actions.

For multi-user authorization, can we change the number of approvers?

Yes. Our minimum number of approvers is 3. We recommend 5 to 7. We do not allow MUA to be disabled. All changes, when approved by the set number of approves, are automatically applied by our solutions with no human touch.

Can you push a change to multiple assets at the same time?

Yes. Our change engine manages all changes in an automated, no touch manner.

If a customer only has the minimum three approvers and one of them is not available, can Cyemptive add another approver for us?

No. Once the system is placed into secure mode with three approvers in place, we cannot add an approver. This approach prevents bad actors from any possibility of compromising your security. We would need to work with you to take your systems off-line and reconfigure similar to a new installation. This is why Cyemptive recommends 5 or more admins be authorized.

Cloud

Are Cyemptive solutions deployed on premises only or can they be supported by cloud?

We can move as quickly as you like. Our recommendation is that you start with an environment assessment and review, which is accomplished in one week. A recommended plan and detailed topology would result from the assessment phase and would include deployment time estimates. Time to deploy depends on the number of attack surfaces you wish to defend with our technology.

Are Cyemptive solutions SOC2 compliant?

All versions are supported.

What data is sent to the Cyemptive SOC?

We send only our own log data to our SOC in order to monitor security operations. We do not send any client data.  

How do you safeguard and separate data sent to your SOC?

Log data is transmitted over a multi-lane, proprietary encrypted VPN. The VPN is protected by CyberSlice© which constantly changes key elements of our integrated infrastructure. The data is then placed on customer specific hardware. We never co-mingle data and do not offer a public shared environment.

Protection

What detection capabilities do Cyemptive solutions contain?

We can move as quickly as you like. Our recommendation is that you start with an environment assessment and review, which is accomplished in one week. A recommended plan and detailed topology would result from the assessment phase and would include deployment time estimates. Time to deploy depends on the number of attack surfaces you wish to defend with our technology.

Does Cyemptive provide malware prevention?

ABSOLUTELY. We prevent both known and unknown malware from ever entering your environment. Fun fact: there are over 250,000 new malware attacks written every day that have no signature or detectable attributes (which are required by non-Cyemptive solutions).

Does Cyemptive protect against ransomware?

Yes. We prevent ransomware with our own proprietary approach that does not use an API based framework and is thus much more effective.  

Will Cyemptive ZeroStrike be able to stop quantum-based attacks?

Yes. We have the only quantum-ready cybersecurity solutions on the commercial market. It is only a matter of time before such attacks become commonplace, and Cyemptive ZeroStrike is ready to defend your network environment today.  

Partners

What differentiation can Cyemptive bring over other existing solutions in the market?

Typical solutions in the market are reactive and must detect and learn attacks first. Unknown exploits will succeed until they are recognized, but offensive AI and metamorphic code can create new malware variants faster than they can be identified, making reactive defenses obsolete. Cyemptive uses a pre-emptive approach, independent of detection, to defeat even unknown attack vectors.

What new technologies (like Gen AI / Quantum) and innovations does Cyemptive use to defeat attacks?

Our competitors are using AI to speed up detection of penetrations and to reduce the time that a successful hack is able to inflict damage. Technologies prevalent in the market today have fallen behind attackers because they rely on pattern changes, API calls, and must first learn the attack methodology. On average a successful attack is inside a victim’s environment for 9 months before it is discovered.  Sophisticated attacks go unseen every day with many never discovered. IP theft, data loss, and reputational damage are rampant. 

Cyemptive does not use a reactive approach and does not have to learn an attack methodology to defeat damage. Our capability is based on innovative and patented technology, CyberSlice©. We also deploy our solutions in a multilayered approach to prevent damage even from internal bad actors.

Is there room for Cyemptive in our portfolio of Palo Alto, Cisco and Crowdstrike, both customer and technology-wise?

Yes, of course. We are confident that as you experience Cyemptive ZeroStrike you will recognize the greater benefit that we deliver.

Does Cyemptive improve the efficiency of the security operations?

Substantially! Our solutions are self-protecting, greatly enhancing your efficiency and eliminating the need to remediate damage.

What support and value proposition does Cyemptive provide to channel partners?

Our partners become an extension of Cyemptive’s military grade defense network! Our partners are able to deliver unparalleled protection to their customers worldwide. Partners gain access to:

  1. Dedicated training and support: Technical training on product implementation, ongoing security best practices, and partner support.
  2. Marketing and lead generation: Co-branded marketing materials, joint lead generation campaigns, and recognition opportunities.
  3. Threat intelligence and collaboration: Early access to threat research, collaborative workshops, and bounty programs (for qualified partners).
  4. Partner portal: A secure online platform for program resources, deal registration, threat intelligence feeds, and partner support.

Revolutionary, highly differentiated solution portfolio offers unmatched security capabilities.

What is the focus on the channel?

Cyemptive uses a channel first, channel partner-preferred focus.

Does Cyemptive support/comply with EU regulations/laws such as GDPR?

Yes. Our global data use / data privacy policy is in full compliance with US, EU and other international laws in the countries we service. NOTE: we do not provide service in countries with government surveillance laws that could compromise our client’s data, or our own IP.

What services can partners develop around Cyemptive?

We provide our solutions and L3/ L4 support in all cases. Partners can add their own expertise, people, products, installation capabilities, assessments, deployment services, L1/ L2, and much more. Together we customize engagement models.

What profits/margins can partners generate when partnering with Cyemptive?

Cyemptive leverages a published, fair and reasonable deal registration program to recognize the contributions of our partners and ensure their investments are rewarded.

Connect to Learn More
Have a question or just want to learn more? We’re here to help.