The Ultimate IoT Platform

Developed in Academia.

Now Securing the world.

Revolutionary asset discovery and monitoring solution

CyAmast discovers all active IoT devices on the network. Once identified, patented machine learning classifies the devices by make and type. The device is then catalogued, and the inventory maintained by automation within the CyAmast platform.

IoT

Internet of Things

OT

Operational Technology

Incredible Technology

CyAmast assists in identifying and addressing potential security issues across the range of possible risks, supply chain issues, hardware, firmware, and software reviews, as well as penetration testing outcomes. This fully validates the end-to-end efficacy of the deployed controls in your IoT environments, and because of our unique architecture, can be across nodes carrying encrypted traffic too.

How CyAmast IoT Works

CyAmast is a unique and proprietary network-level IoT cybersecurity solution that has developed with the enterprise user and cyber security operator in mind. The visibility that CyAmast supplies – from detection, to classification, to monitoring – is second to none. Our goal is to ensure each client has the ability to stay as close to 100% secure and efficient as possible.

1

Detection of IoT/OT devices

Uses AI, machine learning and deterministic models to distinguish between IoT and other devices for accurate inventory

2

Passive & Active Protection

Passive and active deployments can mitigate cyber attacks by signalling exiting firewall and other security infrastructure

3

Visibility at a Flow Level

Flow analysis provides complete visibility into intended device behaviour & determines whether devices are already compromised

4

"Whitelisting" Network Activity

Restrict IoT device and sensor traffic flows to just their intended behaviour and know exactly where your network sits

5

Behaviour Modeling

AI-based profiling and learning of normal behaviour of IoT devices and sensors gives a complete and automated big picture that can be explored in full fidelity

6

Anomaly Detection

Detects deviations from normal behaviours that could indicate either device compromise or malfunction, allowing teams to respond appropriately

Scalable & Cost-effective

Unprecedented scalability
(hundreds of Gbps) without dependence on lots of expensive customised infrastructure

Formal Behavioural Modelling

Compatible with the MUD (Manufactures Usage Descriptions) standard and complements embedded individual device security measures

Forensic Analysis & Compliance

See What, When and Why it happened – lightweight and explainable logs of IoT network behaviour

"

CyAmast is changing the way IoT networks are secured. I look forward to seeing how they catalyse the full power of IoT by providing a more robust asset management and security solution. It’s very early days in the emerging and complex space of IoT, but I believe  CyAmast and their unique approach to be well-placed to ensure the safety of IoT as it fulfils its global promise and helps transform our world.

Paul Barrett – Director IPG

Operational Technology

CyAmast assists in identifying and addressing potential security issues across the range of possible risks, supply chain issues, hardware, firmware, and software reviews, as well as penetration testing outcomes. This fully validates the end-to-end efficacy of the deployed controls in your IoT environments, and because of our unique architecture, can be across nodes carrying encrypted traffic too.

Want to see how CyAmast can improve your Network?

Let us show you how you can improve the operational efficiency and security of your IoT-rich network without any interuption.

What would you like to do?

Contact Us Directly

Organise a Demo

Request a Callback