Founded in 1988, CyberSoft took the industry by storm with the VFind UNIX anti-virus product. Not only was it the first anti-virus scanner for UNIX, it was the first heterogeneous (multi-platform) virus scanner, as well as the first scanner to incorporate a full virus description language, VDL.
We live in a dangerous world where the automation of processes from military battle management to global financial transcation are vulnerable. Our mission is to protect these systems and to do it better than anyone else in the world. We provide UNIX and Linux server security as well as anti virus and malware protection for critical systems.
Our continued research, developement of the lastest tools necessary for us to anticipate and deal with historical, contemporary, and future attacks maintain high degree of efficiency in anti-virus software. Our products will protect the customer to the best of our ability which includes providing support and training to our customers so that they can utilize our anti-virus products to their maximum benefit.
Since its founding in 1988, Cybersoft has worked with many major organizations across both the government and private sectors. Our goal has always been to provide the tools needed to support and operate mission critical systems safely. In addition to the following, Cybersoft has been proudly serving the military and intelligence community for the United States since its founding. Below is a list of some of our current clients.
In the field of anti-virus, computer security, CyberSoft is a niche player - we do one thing and we do it very well. We solve problems. Specifically
computer security problems - such as virus attacks, hacking, data theft, etc.
So how can we help you?
Our Avatar tool, which is part of the VFind™ Security Toolkit Turbo, provides self-healing - including coded verification of your system baseline. Avatar uses a compiled database with replacement files.
Using a modern cryptographic hashing algorithm, the Cryptographic Integrity Tool (CIT) - found in all of our VFind™ Security Toolkits - can be used to verify the contents of any file or external volume, and will alert you anytime a specific file or volume has been altered. CIT will report on what is actually happening on a system, and compiles a text-based report for easy reading and parsing.
The VFind™ pattern analysis program (available in all of our VFind™ Security Toolkits) can not only be used for anti-malware scanning, it is fully programmable by the end user. With the help of our VDL language - if you can think of it, you can scan for it.
We are the only cybersecurity provider to support anti-malware on all major UNIX platforms (including Solaris, HPUX, AIX, Linux, and FreeBSD), if you're looking for a robust security toolkit that detects all forms of attacks, our VFind™ Security Toolkit family of products are sure to be the solution to your computer security needs.
While most computer security manufacturers create complicated, monolithic programs, all of our products contain modular tools that are easy to install, configure, and use. Our customers constantly surprise us with new uses for the tools in our VFind™ Security Toolkit line. Each component can stand alone or be linked together as "software objects" with our other tools, and the only restriction is the imagination of the user. The use of standard input/output and "smart scan" make any third-party interface to our products simple and efficient. We can also port to any UNIX system upon request.
By itself, VFind™ is a powerful general purpose pattern analysis tool that can be used to scan every byte of a file for any type of data you need to locate. Because of the strength of our general scan it is beneficial in virus scanning. We release VDL updates at a minimum of four times per week. These databases include patterns for malware on Microsoft, UNIX, Linux, Java, Macintosh and any other platform we can obtain samples for - these patterns are for malware that are found in operation globally, not from "virus zoo" found on a hacker website. CyberSoft will also put out pandemic warnings with database updates as soon as we can determine one exists. We took care of the WannaCry cyberattack within 72 hours. We did the same with the Dridex/Cridex and CryptoWall malware. We had a code for the Tox ransomware a week before it was discovered.
While there are other effectual anti-malware products on the market, none are as versatile as our toolkit. For example, our toolkit can break down a file bit-by-bit to identify the type of file by it's contents. We also report on all files that have been added, deleted, modified or duplicated. If you also add the disinfection of macro-viruses from OLE documents - such as Microsoft Office documents - then you have one powerful toolkit!
All of our products use as little System Administrator time as possible. They are easy to install and maintain - whenever possible, the products operate without human intervention and perform their work in the background. The installation instructions for the UNIX version of our toolkits are to execute the "install" script.
Our products assume little to nothing about the environment that they are operating in. We assume that all systems are under attack at all times, and that nothing can be trusted.
CyberSoft consulting services can provide full service computer security design, selection, implementation, and use of computer security software. This often takes the form of advice on how to save money and time by configuring our software in unique ways that fulfill customer needs.
CyberSoft support is legendary. We have received many accolades from our customers for the level of support we provide which goes beyond what many other computer security companies are willing to provide. We provide troubleshooting of software integration problems with our products, assistance in forensics, and of course assistance with all of our utility software.
For all your computer security needs, CyberSoft is the key.