Founded in 1988, CyberSoft Operating Corporation took the industry by storm with the VFind UNIX anti-virus product. Not only was it the first anti-virus scanner for UNIX, but it was also the first heterogeneous (multi-platform) virus scanner. Even more ahead of its time, it was additionally the first scanner to incorporate a full virus description language, VDL.
We live in a dangerous world where the automation of processes, from military battle management to global financial transaction, are vulnerable. Our mission is to protect these systems and to do it better than anyone else in the world. We provide UNIX and Linux server security as well as anti-virus and malware protection for critical systems.
We are dedicated to our continued research and development in order for us to anticipate and deal with historical, contemporary, and future attacks as well as to maintain a high degree of efficiency in anti-virus software. We, and our products, will protect our customers to the best of our ability. This means providing support and training to our customers, so that they can utilize our anti-virus products to their maximum benefit.
Cybersoft has worked with many a variety of organizations across both the government and private sectors. Our goal has always been to provide the tools needed to support and operate mission critical systems safely. In addition to the following, Cybersoft has been proudly serving the United States military and intelligence community for the past 32 years. Check out some of our awesome clients that we are currently working with.
In the field of anti-virus and computer security, CyberSoft is a niche player. We do one thing and we do it very well. We solve problems. We work specifically with
computer security problems; such as virus attacks, hacking, data theft, etc.
So how can we help you?
Our Avatar tool, which is part of the VFind™ Security ToolKit Turbo, provides self-healing. It also includes coded verification of your system baseline. Avatar uses a compiled database with replacement files.
Using a modern cryptographic hashing algorithm, the Cryptographic Integrity Tool (CIT)(found in all of our VFind™ Security ToolKits) can be used to verify the contents of any file or external volume. It will also alert you anytime a specific file or volume has been altered. CIT will report on what is happening on a system, and compiles a text-based report for easy reading and parsing.
The VFind™ pattern analysis program (available in all of our VFind™ Security ToolKits) can not only be used for anti-malware scanning, but it is fully programmable by the end user. With the help of our VDL language; if you can think of it, you can scan for it.
We are the only cybersecurity provider to support anti-malware on all major UNIX platforms (including Solaris, HPUX, AIX, Linux, and FreeBSD). If you're looking for a robust security toolkit that detects all forms of attacks, our VFind™ Security ToolKit Family of products are sure to be the solution to all of your computer security needs.
While most computer security manufacturers create complicated and monolithic programs, we've designed all of our products to contain modular tools that are easy to install, configure, and use. Our customers are constantly surprising us with new uses for the tools in our VFind™ Security ToolKit line. Each component can stand alone or be linked together as "software objects" with our other tools, and the only restriction is the imagination of the user. The use of standard input/output and "smart scan" make any third-party interface to our products simple and efficient. We can also port to any UNIX system upon request.
By itself, VFind™ is a powerful general purpose pattern analysis tool, that can be used to scan every byte of a file for any type of data you need to locate. Because of the strength of our general scan, it is beneficial in virus scanning. We release VDL updates, at a minimum of, four times per week. These databases include patterns for malware on Microsoft, UNIX, Linux, Java, Macintosh and any other platform we can obtain samples for. These patterns are for malware that are found in operation globally, not from "virus zoo" found on a hacker website. CyberSoft will also put out pandemic warnings with database updates as soon as we can determine one exists. Here at Cybersoft we took care of the WannaCry cyberattack within 72 hours, and we did the same with the Dridex/Cridex and CryptoWall malware. We even had a code for the Tox ransomware a week before it was discovered.
While there are other effectual anti-malware products on the market, none are as versatile as our toolkit. For example, our toolkit can break down a file bit-by-bit to identify the type of file by it's contents. It also reports on all files that have been added, deleted, modified or duplicated. With the addition of disinfection of macro-viruses from OLE documents, such as Microsoft Office documents, then we've got one powerful toolkit!
All of our products require as little System Administration as possible. Our products are easy to install and maintain, whenever possible, the products operate without human intervention and perform their work in the background. The installation instructions for the UNIX version of our ToolKits are to execute the "install" script.
Our products assume little to nothing about the environment that they are operating in. We assume that all systems are under attack at all times, and that nothing can be trusted.
CyberSoft consulting services can provide full service computer security design, selection, implementation, and use of computer security software. This often takes the form of advice on how to save money and time, by configuring our software in unique ways that fulfill customer needs.
We are definitely not trying to toot our own horn, but CyberSoft customer support is LEGENDARY. We have received many accolades from our customers for the level of support we provide, which goes beyond what many other computer security companies are willing to offer. We provide troubleshooting of software integration problems with our products, assistance in forensics, and assistance with all of our utility software.
For all your computer security needs, CyberSoft is the key.