The Ultimate IoT Platform
Developed in Academia.
Now Securing the world.
Revolutionary asset discovery and monitoring solution
CyAmast discovers all active IoT devices on the network. Once identified, patented machine learning classifies the devices by make and type. The device is then catalogued, and the inventory maintained by automation within the CyAmast platform.
IoT
Internet of Things
OT
Operational Technology
Incredible Technology
CyAmast assists in identifying and addressing potential security issues across the range of possible risks, supply chain issues, hardware, firmware, and software reviews, as well as penetration testing outcomes. This fully validates the end-to-end efficacy of the deployed controls in your IoT environments, and because of our unique architecture, can be across nodes carrying encrypted traffic too.
How CyAmast IoT Works
CyAmast is a unique and proprietary network-level IoT cybersecurity solution that has developed with the enterprise user and cyber security operator in mind. The visibility that CyAmast supplies – from detection, to classification, to monitoring – is second to none. Our goal is to ensure each client has the ability to stay as close to 100% secure and efficient as possible.
Detection of IoT/OT devices
Uses AI, machine learning and deterministic models to distinguish between IoT and other devices for accurate inventory
2
Passive & Active Protection
Passive and active deployments can mitigate cyber attacks by signalling exiting firewall and other security infrastructure
Visibility at a Flow Level
Flow analysis provides complete visibility into intended device behaviour & determines whether devices are already compromised
4
"Whitelisting" Network Activity
Restrict IoT device and sensor traffic flows to just their intended behaviour and know exactly where your network sits
5
Behaviour Modeling
AI-based profiling and learning of normal behaviour of IoT devices and sensors gives a complete and automated big picture that can be explored in full fidelity
6
Anomaly Detection
Detects deviations from normal behaviours that could indicate either device compromise or malfunction, allowing teams to respond appropriately
Scalable & Cost-effective
Unprecedented scalability
(hundreds of Gbps) without dependence on lots of expensive customised infrastructure
Formal Behavioural Modelling
Compatible with the MUD (Manufactures Usage Descriptions) standard and complements embedded individual device security measures
Forensic Analysis & Compliance
See What, When and Why it happened – lightweight and explainable logs of IoT network behaviour
"
CyAmast is changing the way IoT networks are secured. I look forward to seeing how they catalyse the full power of IoT by providing a more robust asset management and security solution. It’s very early days in the emerging and complex space of IoT, but I believe CyAmast and their unique approach to be well-placed to ensure the safety of IoT as it fulfils its global promise and helps transform our world.
Paul Barrett – Director IPG
Operational Technology
CyAmast assists in identifying and addressing potential security issues across the range of possible risks, supply chain issues, hardware, firmware, and software reviews, as well as penetration testing outcomes. This fully validates the end-to-end efficacy of the deployed controls in your IoT environments, and because of our unique architecture, can be across nodes carrying encrypted traffic too.
Want to see how CyAmast can improve your Network?
Let us show you how you can improve the operational efficiency and security of your IoT-rich network without any interuption.
What would you like to do?