FAQs
About Cyban
What is Cyban?
Does Cyban slow devices down?
What devices can be monitored?
Cyban can be used on servers, desktops, laptops and mobile devices. Cyban is compatible with devices that use Android, macOS and Windows. We don’t yet support Apple iOS or Linux, but we will be adding support in future.
Is Cyban secure?
- Designed and built by security experts
- Built with military grade security
- Uses end-to-end encryption
Can you track progress of risk management?
Yes. The dashboard’s Risk Report page has graphs indicating the change by month of risk profile (i.e. data at risk) and the monthly change in cyber scores.
Do you copy my business data?
Your data stays on your devices. Cyban does not copy or transmit any of your business data assets. Feeds are sent securely from the sensors installed on your devices to our cloud environment where the dashboard and AI operate. Sensor feeds only contain the results of monitoring your device.
Will my Firewall block the Cyban sensor?
Check the following:
- The Cyban Sensor makes outbound network connections on port 53255. Configure your firewall to have port 53255 open for outbound connections.
- Details of any internet proxy must be set in the system level HTTPS_PROXY environment variable.
What makes Cyban unique?
Cyber score
Rather like a credit score, Cyban scores your cyber security at an organisational level. Built on device level measurements, your cyber score assesses potential exposure of data and vulnerability to cyber attack. The score ranges from 0 to 999 and the higher your score the better your cyber security is.
Data exposure risk
Data exposure value is assessed through the combination of how valuable the data, what the costs of data loss might be and the likelihood of loss. Data loss costs include:
- Direct costs: forensic investigation, IT system remediation, fines, customer compensation, etc.
- Indirect costs: lost business opportunities as a consequence of negative reputation, share price impact, etc.
The potential costs can be unexpetedly high. Cyban makes an assessment based on the number of sensitive data points you have on your devices together with real-world data collected by IBM and the Poneman Institute for business size, sector and geography. This is, obviously, an estimation but it serves to give a richer view of your exposure than simply software vulnerability testing.
Recommendations to reduce exposure
Detection of out-of-date software or operating systems
Cyban is capable of inspecting your operating system (OS) and finding all the software applications installed on your device. It checks whether your software or OS are out-of-date. The dashboard reports out-of-date software at both a summary level for your organisation and down to device level.
Clear summary for executives, detailed data for IT professionals
Cyban is designed for ease of use. Executives tell us time-and-time again how simple Cyban is to use and they love the quick, clear insights into their cyber vulnerability. IT staff tell us they find Cyban invaluable in guiding daily tasks keeping systems up to date.