top of page
CYSANA detects more MALWARE
than any other Tool
The ultimate all in one tool
More granular
Atomic level/binary level
Line-by-line in code
Includes highly innovative application of recent
Machine Learning,
Natural Language Processing
and Neural Network research
Your company needs to detect as many vulnerabilities as it can to limit risk
SEVEN FILTER APPROACH
00010101010101010010101010111010100010101010101010
0101010
Fingerprinting
94-97%
00010101010101010010101010111010100010101010101010
0101010
Digital Certificate
95%
00010101010101010010101010111010100010101010101010
0101010
Neural Networks
99%
00010101010101010010101010111010100010101010101010
0101010
A
B
C
NLP
9X%
99+%
We put our own spin on traditional malware filters, as well as applying novel ones
So many types of binaries!
All binaries are prone to the same risks, not just the ones in the most common file formats
RANSOMWARE attack cycle
Best to detect malware (ransomware) and vulnerabilities as early in the attack cycle as possible
HOW IT WORKS
Install on each endpoint
One-time audit
of all
installed software
Daily cloud updates
to database
and ML model
Real-time scan of only new software downloads/patches keeps company up to date
without slowing down network
Reporting to supplier and/or directly to the network host
After an initial audit, the system checks every new software update in real-time without slowing endpoints down
Deep Learning Model Architecture for Functions
DEEP LEARNING Model Architecture
for BITS AND BYTES AND IMAGE ANALYSIS
Chihuahua vs. muffin:
AI-based image classification
Is it a cute little dog…or a tasty breakfast pastry?
MALWARE EXECUTABLE OR BENIGN FILE?
Malicious
After decompiling executable files we analyze them as bits and bytes and also convert them to 2D images to discover spatial correlations
that look like malware
Benign
The system trains on images of thousands of good and bad files
to recognize differences in how files look
when they do and do not contain malware
CORE
David
CEO
Pavlo
Dev Sec Ops
Santhosh
Research Scientist
Cara
Data Visualization
Rashed
Scrum Master
Selva
Machine Learning
Georgia
Deep Learning
Andreas
Cybersecurity
INTERNS
Jennifer
Brand
Farhan
Knowledge Mgmt
Duin
Neural Networks
Michelle
Marketing
Sushama
Data Scientist
Mohammad
Image Data
Prathamesh
Database
Thomas
Streaming
Abel
Operations
Jeremy
Partnerships
Phuong
Controlling
Christian
Finance
Sofiia
Administration
Samantha
Website
Sakif
Networking
Cai
Interface
Ketu
Backend
Dineesha
Cloud
Ruben
Business Analyst
Arsen
Scaling
team
ADVISORS
Arghir
Networks Advisor
Mohan
Anomaly Advisor
Pramod
Data Fusion Advisor
Alan
Commercialization
Daniel
Product
Kasia
Time Series
Barry
Buisness Advisor
AWARDS
Most innovative cybersecurity startups worldwide for banks (Global)
Tech for Integrity Challenge – Top 10% of fintechs (Global)
ISV National Award – 1st Place Business Innovation (Germany)
Cybersecurity Fintech Challenge – Finalist Top 5 (Canada)
“[Cysana's] approach appropriately builds on previous research.…”
US Department of Homeland Security
Named to most innovative cybersecurity SMEs in the UK 2 years in a row
UK Government Cybersecurity Directorate (DCMS)
Awarded a 1.2 million CAD R&D matching grant by PROMPT
Quebec Ministry of Economy and Innovation – PICQ program
Spoke at Summer Davos and participates in anti-corruption initiative
WEF Tech for Integrity Community
bottom of page