top of page

CYSANA detects more MALWARE
than any other Tool



The ultimate all in one tool
More granular
Atomic level/binary level
Line-by-line in code
Includes highly innovative application of recent
Machine Learning,
Natural Language Processing
and Neural Network research
Your company needs to detect as many vulnerabilities as it can to limit risk
SEVEN FILTER APPROACH
00010101010101010010101010111010100010101010101010
0101010

Fingerprinting
94-97%
00010101010101010010101010111010100010101010101010
0101010

Digital Certificate
95%
00010101010101010010101010111010100010101010101010
0101010

Neural Networks
99%
00010101010101010010101010111010100010101010101010
0101010
A
B
C
NLP
9X%
99+%
We put our own spin on traditional malware filters, as well as applying novel ones
So many types of binaries!

All binaries are prone to the same risks, not just the ones in the most common file formats
RANSOMWARE attack cycle


Best to detect malware (ransomware) and vulnerabilities as early in the attack cycle as possible
HOW IT WORKS





Install on each endpoint
One-time audit
of all
installed software
Daily cloud updates
to database
and ML model
Real-time scan of only new software downloads/patches keeps company up to date
without slowing down network
Reporting to supplier and/or directly to the network host
After an initial audit, the system checks every new software update in real-time without slowing endpoints down

Deep Learning Model Architecture for Functions
DEEP LEARNING Model Architecture
for BITS AND BYTES AND IMAGE ANALYSIS

Chihuahua vs. muffin:
AI-based image classification

Is it a cute little dog…or a tasty breakfast pastry?
MALWARE EXECUTABLE OR BENIGN FILE?
Malicious

After decompiling executable files we analyze them as bits and bytes and also convert them to 2D images to discover spatial correlations
that look like malware
Benign

The system trains on images of thousands of good and bad files
to recognize differences in how files look
when they do and do not contain malware
CORE


David
CEO
Pavlo
Dev Sec Ops

Santhosh
Research Scientist

Cara
Data Visualization

Rashed
Scrum Master

Selva
Machine Learning

Georgia
Deep Learning

Andreas
Cybersecurity
INTERNS


Jennifer
Brand
Farhan
Knowledge Mgmt

Duin
Neural Networks

Michelle
Marketing

Sushama
Data Scientist

Mohammad
Image Data

Prathamesh
Database

Thomas
Streaming

Abel
Operations

Jeremy
Partnerships

Phuong
Controlling

Christian
Finance


Sofiia
Administration
Samantha
Website

Sakif
Networking


Cai
Interface


Ketu
Backend

Dineesha
Cloud
Ruben
Business Analyst
Arsen
Scaling
team




ADVISORS
Arghir
Networks Advisor
Mohan
Anomaly Advisor
Pramod
Data Fusion Advisor
Alan
Commercialization

Daniel
Product

Kasia
Time Series

Barry
Buisness Advisor

AWARDS
Most innovative cybersecurity startups worldwide for banks (Global)

Tech for Integrity Challenge – Top 10% of fintechs (Global)

ISV National Award – 1st Place Business Innovation (Germany)

Cybersecurity Fintech Challenge – Finalist Top 5 (Canada)

“[Cysana's] approach appropriately builds on previous research.…”
US Department of Homeland Security

Named to most innovative cybersecurity SMEs in the UK 2 years in a row
UK Government Cybersecurity Directorate (DCMS)

Awarded a 1.2 million CAD R&D matching grant by PROMPT
Quebec Ministry of Economy and Innovation – PICQ program

Spoke at Summer Davos and participates in anti-corruption initiative
WEF Tech for Integrity Community
bottom of page