Vir2us

Virtually all cyber security solutions on the market today are top-down and outside-in solutions that simply cannot cope with unknown cyber threats.  These legacy solutions erect barriers and attempt to identify cyber threats from constantly updated lists.  Once these barriers are breached, however, these solutions provide virtually no security.

 

 

Mr. Michael J. Jacobs

Mike served as Vice President of SRA International Inc. since September 1, 2005. Mr. Jacobs served as a Senior Advisor of Cyber and National Security for SRA. He served as the Deputy Associate Director for Operations, Military Support, where he was responsible for developing a single, coherent military support strategy for NSA. Prior to Cyber and National Security, Mr. Jacobs was the Information Assurance (IA) Director at the NSA.

Vir2us Product Innovation

The early architects of the computer industry did not envision global public networks, such as the internet, or the computing devices and environment that comprises the computer industry today.  These early designers of machine language-based computer resource management hardware and software could not have foreseen the capabilities of such networks or the many security problems that such an environment would produce.

 

The demand for greater and greater processing capability quickly overran the architectural limitations of these now-obsolete computing processes.  Solutions offered by the computer security industry today are mere patches to the many holes in this legacy fabric and an outdated way of thinking about secure computing.  As a result, these solutions address only the symptoms of a much larger and more fundamental design problem.

 

The vir2us VMunity suite of software and software enabled hardware solutions takes a different approach to secure computing by fundamentally changing the way computers work.  Vir2us replaces legacy computing processes for using computer hardware and software with a highly innovative architecture that makes cyber borne threats irrelevant.  Vir2us VMunity technologies make secure computing proactive rather than reactive, operating below the OS to deliver higher performance, an unchanged user experience and compatibility with virtually any computing platform.

Only vir2us patented VMunity technology enables zero vulnerability computing environments to provide inside-out and bottom-up endpoint security.

Vir2us – Thinking Differently about Cyber Security

Virtually every cyber security hack or exploit that has been widely reported in the media began with an endpoint security breach.  Yet, most cyber security firms do not provide genuine endpoint security solutions.  Why not?  Because nearly all solutions providers approach cyber security from the perspective of the hacker, (also know as an “outside-in” approach).  These methods of attempting to keep out hackers and malicious software consistently fail because once checkpoints are breached these security methods collapse and provide virtually no security.

Legacy above-the-OS solutions (top-down) are quickly bypassed by low-level exploits in the kernel and bios.  Legacy antivirus and even more recent list-based solutions simply cannot keep pace with the quickly evolving cyber-threat landscape, and add significant latency and overhead to networks and computing resources.

Vir2us thinks differently about cyber secure computing.  We recognized that aging computer designs were not architected for today’s cyber connected world and that an innovative and fundamental change in the way computing resources were managed was required.  The result is a patented secure computing platform that makes endpoint computing  immune to to both known and unknown cyber-borne threats.

Vir2us Citadel – Securing Government and Critical Infrastructure

The U.S. Government has estimated over one billion attempts are made each year to breach its information systems.  Once inside most government systems, these cyber spies encounter little security.  Additionally, global governments are the first line of defense in what the U.S. Department of Defense refers to as the “fifth battle field”, which includes all critical infrastructure including water, power, banking and communications to name just a few (The U.S. Department of Homeland Security has defined seventeen areas of critical infrastructure).

Citadel is a fully integrated system for real-time monitoring, defense and response to cyber threats against nation states critical infrastructure that quickly intercepts cyber threats before they become active, and provides actionable data for real-time planned response.  Citadel incorporates the patented Vir2us VMunity technology to deliver 99.99%-100% end-point security in classified data environments and for securing critical infrastructure and digital assets.

Vir2us Return on Investment

The Vir2us VMunity platform eliminates latency and overhead resulting in greatly improved network and computing  performance.  Most firms will realize an almost immediate return on their secure computing investment.  Additionally, only Vir2us provides a fully integrated set of secure computing components that ensure pristine and uncompromised computing environments.

The Ponemon Institute did a study and focused on the following cybercrimes:

• Stealing an organization’s intellectual property
• Confiscating online bank accounts
• Creating and distributing viruses on other computers
• Posting confidential business information on the internet
• Disrupting a country’s critical national infrastructure

The Ponemon Institute compiled the following costs accrued by a business battling the above cybercrimes:

• Costs to detect, recover, investigate and manage the incident response
• After-the-fact costs such as business disruption and loss of customer

Ponemon researchers visited 257 companies (each having at least 1,000 seats), completing 2,081 interviews with management personnel. There were 1,717 total attacks used to measure costs, and $7.6 million US was the average annualized cost. The report adds: “Approximately 10 months of effort was required to recruit companies, build an activity-based cost model to analyze the data, collect source information and complete the analysis.“

The above incidents show how data breach incidents are leading to claims against directors and officers, as well as the company itself. The US and EU are leading the way with mandatory data breach notification and disclosure requirements, focusing on protecting information held by companies and mandating that privacy and data protection policies be put in place and implemented. Directors should not only be concerned about any damages awarded, but also the associated costs, including a lower share price, reputational damage and defense costs.

Do You Believe Your Business Is Safe From Cyber Attacks?

Start A Conversation With Us