About Us

Founded in 1988, CyberSoft Operating Corporation took the industry by storm with the VFind UNIX anti-virus product. Not only was it the first anti-virus scanner for UNIX, but it was also the first heterogeneous (multi-platform) virus scanner. Even more ahead of its time, it was additionally the first scanner to incorporate a full virus description language, VDL.

We live in a dangerous world where the automation of processes, from military battle management to global financial transaction, are vulnerable. Our mission is to protect these systems and to do it better than anyone else in the world. We provide UNIX and Linux server security as well as anti-virus and malware protection for critical systems.

We are dedicated to our continued research and development in order for us to anticipate and deal with historical, contemporary, and future attacks as well as to maintain a high degree of efficiency in anti-virus software. We, and our products, will protect our customers to the best of our ability. This means providing support and training to our customers, so that they can utilize our anti-virus products to their maximum benefit.


Cybersoft has worked with many a variety of organizations across both the government and private sectors. Our goal has always been to provide the tools needed to support and operate mission critical systems safely. In addition to the following, Cybersoft has been proudly serving the United States military and intelligence community for the past 32 years. Check out some of our awesome clients that we are currently working with.

Aerospace and Defense
Icon - Aerospace and Defense

The Boeing Company

Boeing is the world's largest aerospace company, and one of the largest US defense contractors.


British Aerospace is Europe's largest defense contractor. We partnered with BAE to integrate our product into STOP, (a custom operating system with security as its primary objective.)

Lockheed Martin Corporation

Lockheed Martin is the world leader in defense and security technologies. They have also been a longtime user of VFind and the rest of the VSTK.
IT Consulting
Icon - IT Consulting

Booz Allen Hamilton

Booz Allen Hamilton Inc. provides technology colsulting services on a global scale. These services include engineering, cloud computing, cyber security, cyber solutions, and systems delivery.


Accenture is a global management consulting, technology services and outsourcing company, with approximately 323,000 people serviing clients in more than 120 countries.

Science Applications International Corporation

SAIC is a premier technology integrator solving our nation's most complex modernization and readiness challenges across the defense, space, federal citizen, and intelligence markets.

Why CyberSoft?

In the field of anti-virus and computer security, CyberSoft is a niche player. We do one thing and we do it very well. We solve problems. We work specifically with computer security problems; such as virus attacks, hacking, data theft, etc.

So how can we help you?

Self Healing

Our Avatar tool, which is part of the VFind™ Security ToolKit Turbo, provides self-healing. It also includes coded verification of your system baseline. Avatar uses a compiled database with replacement files.

File Integrity & Event Monitoring

Using a modern cryptographic hashing algorithm, the Cryptographic Integrity Tool (CIT)(found in all of our VFind™ Security ToolKits) can be used to verify the contents of any file or external volume. It will also alert you anytime a specific file or volume has been altered. CIT will report on what is happening on a system, and compiles a text-based report for easy reading and parsing.

Data Spill Clean-up

The VFind™ pattern analysis program (available in all of our VFind™ Security ToolKits) can not only be used for anti-malware scanning, but it is fully programmable by the end user. With the help of our VDL language; if you can think of it, you can scan for it.

We are the only cybersecurity provider to support anti-malware on all major UNIX platforms (including Solaris, HPUX, AIX, Linux, and FreeBSD). If you're looking for a robust security toolkit that detects all forms of attacks, our VFind™ Security ToolKit Family of products are sure to be the solution to all of your computer security needs.

While most computer security manufacturers create complicated and monolithic programs, we've designed all of our products to contain modular tools that are easy to install, configure, and use. Our customers are constantly surprising us with new uses for the tools in our VFind™ Security ToolKit line. Each component can stand alone or be linked together as "software objects" with our other tools, and the only restriction is the imagination of the user. The use of standard input/output and "smart scan" make any third-party interface to our products simple and efficient. We can also port to any UNIX system upon request.

By itself, VFind™ is a powerful general purpose pattern analysis tool, that can be used to scan every byte of a file for any type of data you need to locate. Because of the strength of our general scan, it is beneficial in virus scanning. We release VDL updates, at a minimum of, four times per week. These databases include patterns for malware on Microsoft, UNIX, Linux, Java, Macintosh and any other platform we can obtain samples for. These patterns are for malware that are found in operation globally, not from "virus zoo" found on a hacker website. CyberSoft will also put out pandemic warnings with database updates as soon as we can determine one exists. Here at Cybersoft we took care of the WannaCry cyberattack within 72 hours, and we did the same with the Dridex/Cridex and CryptoWall malware. We even had a code for the Tox ransomware a week before it was discovered.

While there are other effectual anti-malware products on the market, none are as versatile as our toolkit. For example, our toolkit can break down a file bit-by-bit to identify the type of file by it's contents. It also reports on all files that have been added, deleted, modified or duplicated. With the addition of disinfection of macro-viruses from OLE documents, such as Microsoft Office documents, then we've got one powerful toolkit!

All of our products require as little System Administration as possible. Our products are easy to install and maintain, whenever possible, the products operate without human intervention and perform their work in the background. The installation instructions for the UNIX version of our ToolKits are to execute the "install" script.

Our products assume little to nothing about the environment that they are operating in. We assume that all systems are under attack at all times, and that nothing can be trusted.

Consultation & Technical Support

CyberSoft consulting services can provide full service computer security design, selection, implementation, and use of computer security software. This often takes the form of advice on how to save money and time, by configuring our software in unique ways that fulfill customer needs.

We are definitely not trying to toot our own horn, but CyberSoft customer support is LEGENDARY. We have received many accolades from our customers for the level of support we provide, which goes beyond what many other computer security companies are willing to offer. We provide troubleshooting of software integration problems with our products, assistance in forensics, and assistance with all of our utility software.

For all your computer security needs, CyberSoft is the key.


"My company, GTE Government Systems Corporation and our customers have done extensive investigation into the wide variety of security and anti-virus products on the market and have concluded that VFind™ is the best available product to meet the requirements of our mission critical systems. VFind™ provides us with a sense of security that out UNIX based data is not corrupted or infected and that we can operate with it safely."
John Piernikowski - GTE Government Systems
Sr. Systems Engineer
"CyberSoft's commercial, off-the-shelf product, VFind™ for UNIX, is offered by SAIC to our customer the US Army CECOM under the Lightweight Computer Unit (LCU) prime contract and the Applique prime contract. VFind™ has performed as advertised and has fulfilled its requirements with no customer complaints."
Gary Mancuso - SAIC Computer Systems
Subcontract Administrator
"CyberSoft is a member of our ICASE program team. They are the subcontractor supplying the VFind™ for UNIX COTS security software package. They performed their role very satisfactorily and contributed to the success of the award and subsequent performance requirements."
Sharon Henckelm - Logicon Information Technology Group
Subcontract Administrator
"Our customers require solutions that provide the highest levels of security for their IT Infrastructure. CyberSoft delivers a broad range of products that meet many of the specific security requirements. They are extremely responsive, and always deliver."
Justin Jolly - Tenix America
Senior Technical Consultant
"Readers of my Solaris column will know how paranoid I am about security for our customers. CyberSoft is the answer to my prayers. They understand the problem and have set about to deliver a suite of products that ensure the integrity of my site. VFind™ and CIT are very inexpensive tools that can save your company huge amounts of money in tracking and eradicating problems."
Roger Harmston - Sun Server Magazine
"Unlike the off-the-shelf anti-virus programs of the DOS/Windows world, CyberSoft's VFind™ is a group of utilities that can be customized for the end user's needs. Conclusion: CyberSoft's utilities are more than anti-virus utilities...They provide complete protection against thousands of other platform viruses... CyberSoft's utilities are of a unique and versatile kind in the market."
National Software Testing Labs
"As an Internet Administrator whose main servers are Sun Unix systems, I always seem to be fighting that never ending battle of keeping [hackers] off my computers. Even with the security patches and router access control, one of [them] got lucky. If it wasn't for the CyberSoft Cryptographic Integrity Tool, I would never have known that my /etc/rc* boot files were modified. CIT has really made my life easier administering my system. Besides saving my proverbial skin that day...I look at that output everyday to give me an indication of what is going on the whole system. Great Tool!"
Montgomery County, PA