cyan’s Threat Intelligence

The hybrid force driving our security solutions

We enhance human intelligence with machine learning to deliver state-of-the-art cyber-threat detection

We work 24/7 to safeguard millions of Internet users all over the world.

Our digital security products are powered by a hybrid force: we combine human and machine-driven research methods to detect and resolve cyber-threats targeting your customers.

1.000

DNS Requests
processed every month

+ 300

Threat Data Entries powering our data bases

1.5

New Threats entries fed into our data-bases on average per month

25

Automated Methods of web categorization detecting cyber-threats

Prevent breaches by predicting the next move of cyber-criminals’

We combine machine intelligence with an expert team of data scientists who have an in-depth understanding of the ever-evolving nature of cyber-threats.

Protect your customers
Customer-Oriented Threat Protection

We provide protection against phishing, malware, Trojans, and a full range of cyber-threats targeting your customers.

Advanced methodology
Advanced Methodology

From image recognition to machine learning and multi-domain correlation, we use advanced content techniques to keep up with new cyber-threats.

Identify and take advantage of new revenue opportunities
Automated Category Checking

We use groupings of DNS domains (e.g. pornography, gambling, violence, illegal drugs) to provide accurate protection at customer level.

Real Privacy Protection
Data Privacy guaranteed

We give your customers complete privacy by safeguarding and encrypting all data between your network and our databases at all times.

Threat Intelligence Technology
Global Threat Intelligence

Our security database is securely hosted in Austria, powered by more than 200 virtual machines all over the world.

Anonymized DNS
Anonymized DNS Requests

We give our clients the possibility of improving localized cyber-threat detection, by enabling us to process anonymized DNS requests, in compliance with the Telecom regulations and data privacy laws.

Protect your customers now.

How It Works

Crunching big numbers to provide your customers with easy security solutions.

Threat Intelligence Server - Crunching big numbers to deliver easy security solutions to your customers.
Our threat database is updated in a 2 hours cycle, aiming at real time feeding

Out Methods

The hybrid force driving our solutions

  • Big Data analysis: We process more than +1,000 billion anonymized DNS requests per month, whereby suspicious domains are identified and fed into our research environment.
  • Global Live Sourcing: Our virtual machines are distributed in data centers all over the world, running content analysis 24/7 and providing output to our threat database.
  • Human Intelligence: Our team of data scientists ensures the quality of automated website categorization by orchestrating global machine efforts at our central research hub in Europe.
  • Ongoing Data Updates: Our threat database is updated in a 2-hourly cycle, targeted at feeding new threat findings directly into our the engines of our customers in real time.
Threat Intelligence Technology

Threat Intelligence

The hybrid force powering all of our solutions

We provide you with a wide range of digital security solutions powered by our leading threat intelligence. Our seamless approach covers all platforms and devices with network and application-based products. We can help you to protect your customers – anytime, anywhere.

Threat Intelligence Product Platform

All of our product variants exist on the same platform and within the same architecture.

As a result, they complement each other perfectly. Each module can be updated or added to its specific industrial needs. We deliver network-based and application-based security from a single source which comes with many additional tools. We can also optionally monitor and operate the platform for you. As the end users of this solution, your customers will have the same user experience with all product variants.

Behavioral Protection

We provide the solution with maximum security, including protection against malicious web content for mobile and desktop devices. Independently of the type of Internet access, it works within domestic wireless and mobile networks, and on roaming networks.

Device Protection

We make a contribution towards producing an efficient and preventive security layer that allows us to identify deviations from a baseline of normal user normal behavior. Efficient protection of their devices, including anti-virus and malware protection, is guaranteed as a result.

Personal Data Protection

Personal data is an important issue in the information age. We help your customers to prevent their data such as passwords, usernames, account numbers, and other related registration data from ending up in the wrong hands.

Administration & Reporting

We give your customers the ability to make security and content settings which can be used on the devices of children, family members or employees and provide a report which shows statistics, usage, and the security status at a glance.

Marketing

CRM Light:

A campaign tool/engine can be integrated into the CMS software suite and used to configure specific campaigns that will be displayed to subscribers at certain times/events, or implement a try-and-buy / upselling campaign.

Reporting:

A reporting tool can be provided with analysis of interesting data such as the number of requests allowed, blocked, or the most popular domains. This data can be extracted to your existing business intelligence infrastructure.

Monitoring

Our in-house team of experts monitors all functionality 24/7 to provide technical excellence and ensure that your solution performs at the highest level.

Threat Intelligence

Our Threat Intelligence Technology – the hybrid force driving our security solutions

Our digital security products are driven by a hybrid force: we combine human and machine-driven research methods to detect and resolve cyber-threats that are targeting your customers. We prevent breaches by predicting the next move of cyber-criminals. We combine machine intelligence with an expert team of data scientists who have an in-depth understanding of the constantly evolving nature of cyber-threats.

Bundling of customer centric and solution- oriented features to deliver the best experience.

All of our product variants exist on the same platform and within the same architecture.

As a result, they complement each other perfectly. Each module can be updated or added to its specific industrial needs. We deliver network-based and application-based security from a single source which comes with many additional tools. We can also optionally monitor and operate the platform for you. As the end users of this solution, your customers will have the same user experience with all product variants.

Behavioral Protection

We provide the solution with maximum security, including protection against malicious web content for mobile and desktop devices. Independently of the type of Internet access, it works within domestic wireless and mobile networks, and on roaming networks.

Device Protection

We make a contribution towards producing an efficient and preventive security layer that allows us to identify deviations from a baseline of normal user normal behavior. Efficient protection of their devices, including anti-virus and malware protection, is guaranteed as a result.

Personal Data Protection

Personal data is an important issue in the information age. We help your customers to prevent their data such as passwords, usernames, account numbers, and other related registration data from ending up in the wrong hands.

Administration & Reporting

We give your customers the ability to make security and content settings which can be used on the devices of children, family members or employees and provide a report which shows statistics, usage, and the security status at a glance.

Hosting

Our products provide three main hosting options: On-premise, cloud and hybrid. We will find the most suitable solution depending on your needs and capabilities.

Integration

The platform integrates closely and seamlessly into your infrastructure and makes it easy to deal with all users.

Marketing

Light CRM

A campaign tool/engine can be integrated into the CMS software suite and used to configure specific campaigns that will be displayed to subscribers at certain times/events, or implement a try-and-buy / upselling campaign.

Reporting:

A reporting tool can be provided with analysis of interesting data such as the number of requests allowed, blocked, or the most popular domains. This data can be extracted to your existing business intelligence infrastructure.

Monitoring

Our in-house team of experts monitors all functionality 24/7 to provide technical excellence and ensure that your solution performs at the highest level.

Threat Intelligence

Our Threat Intelligence Technology – the hybrid force driving our security solutions

Our digital security products are driven by a hybrid force: we combine human and machine-driven research methods to detect and resolve cyber-threats that are targeting your customers. We prevent breaches by predicting the next move of cyber-criminals. We combine machine intelligence with an expert team of data scientists who have an in-depth understanding of the constantly evolving nature of cyber-threats.

Find the right solutions for your customers.

Use Cases

Digital security for any customer segment

From savvy Internet users to small business owners, you can address profitable customer segments with digital security solutions under your own brand and provide real protection from cyber-threats using our leading technology and our integrated approach.

Individual Protection

Protect individuals with different layers of Seamless Security

Child Protection

Safeguard the virtual world of the youngest users

Family & Home Protection

Safeguard multiple devices and include Child Protection features

Business Protection

Provide small and medium enterprises with protection against security breaches

Test our solutions

with our experts

Request Demo

Non-binding and free of charge.

Do you have any questions?

We have the answers.

Contact Us Now