FAQs
About Cyban
What is Cyban?
Does Cyban slow devices down?
What devices can be monitored?
Is Cyban secure?
- Designed and built by security experts
- Built with military grade security
- Uses end-to-end encryption
Can you track progress of risk management?
Do you copy my business data?
Your data stays on your devices. Cyban does not copy or transmit any of your business data assets. Feeds are sent securely from the sensors installed on your devices to our cloud environment where the dashboard and AI operate. Sensor feeds only contain the results of monitoring your device.
Will my Firewall block the Cyban sensor?
Check the following:
- The Cyban Sensor makes outbound network connections on port 53255. Configure your firewall to have port 53255 open for outbound connections.
- Details of any internet proxy must be set in the system level HTTPS_PROXY environment variable.
What makes Cyban unique?
Cyber score
Monetary value of data loss (Value at Risk)
The value at risk is the maximum potential cost to your business if your sensitive data is lost, breached or held to ransom. It includes:
- Direct costs: forensic investigation, IT system remediation, fines, customer compensation, etc.
- Indirect costs: lost business opportunities as a consequence of negative reputation, share price impact, etc.
The size of this value often surprises! Cyban calculates it based on the number of sensitive data points you have on your devices and real-world data collected by IBM and the Poneman Institute for business size, sector and geography. It’s also possible for you to manually set values to use for the calculation.
Recommendations to reduce exposure
Detection of out-of-date software or operating systems
Cyban is capable of inspecting your operating system (OS) and finding all the software applications installed on your device. It checks whether your software or OS are out-of-date. The dashboard reports out-of-date software at both a summary level for your organisation and down to device level.