Free Phishing Attack Simulator


How DNSCyte works?
By only redirecting the external DNS Servers to DNSCyte, the system starts to discover and block threats.
Can I use DNSCyte for category-based Internet filtering?
Yes. DNSCyte provides more than 70 different categories like gambling, games to provide secure access to the Internet.
Is it possible to discover the source of malicious activity?
Yes. We integrate with any internal DNS Server to identify the source of malicious traffic.
Which DNS Servers are supported for analysis?
Windows DNS, OpenDNS, F5, Infoblox are some of the major DNS servers supported.
Do you provide roaming client support?
Yes. A very lightweight agent is installed on desktop and mobile platforms to enforce DNSCyte DNS servers enabling secure Internet access 24/7.
Can DNSCyte protect from zero-day attacks?
Yes. DNSCyte can provide protection from zero-day attacks. Advanced whitelisting enables smooth browsing in Internet without the risk of accessing unknown destinations.
Does DNSCyte prevent DNS tunnelling?
Yes. DNSCyte blocks DNS tunnelling.
What is Multi-Factor Authentication?
Multi-Factor Authentication (MFA) is a security system that verifies a user’s identity by requiring multiple credentials rather than just asking for a username and password, MFA requires other—additional—credentials, such as a code from the user’s smartphone, the answer to a security question, a Push Notification Confirmation, fingerprint, etc.
What platforms are currently supported?
A list of supported platforms are summarised below:
• Salesforce
• Office 365
• Amazon
• Dropbox
• DocuSign
• Windows Logon
• Microsoft RDP
• Linux Logon
• Microsoft OWA Logon
• Microsoft ActiveSync Logon
• VPN Login
• OpenLDAP
• Microsoft Active Directory
• Microsoft SQL Server
• API for supporting any custom application.
How does IDCyte work?
IDCyte provides support for on-premise and cloud deployments based on the preference.
Does IDCyte provide self-service password reset?
Yes. Users can execute self-service password reset and change, account opening, and worker processes that are running in Microsoft Windows Active Directory or OpenLDAP.
Does IDCyte support SAML 2.0?
Yes. SAML 2.0 is supported.
What are the supported authentication methods for IDCyte?
IDCyte Push, sent by our IDCyte Mobile authentication app, allows users to approve push notifications to verify their identity. We also support Universal 2nd Factor (U2F) security tokens, hardware tokens, mobile OTP and SMS to provide flexible and accessible options for all types of users – from clinicians to third-party contractors.
Is geolocation-based access control supported?
Yes. It is possible to see and control where users are authenticated, and unauthorised access from undefined geographic locations can be prevented.
What is NetCyte?
NetCyte is a network access control and threat discovery platform providing total visibility and policy enforcement. NetCyte is an agentless, 802.1X independent solution to prevent unauthorised computer access to corporate networks.
Why NetCyte is unique?
NetCyte has distinctive features providing solutions to challenges in discovering cyber threats as summarised below:
• Ability to discover weak passwords in any kind of device.
• Detect port scans and password breach attempts without an agent installation or requiring an appliance on remote networks.
• Track important audit data. Important security events like password changes, account lockouts, event log deletion and group membership changes can be discovered.
• Advanced process analysis for discovering traffic flow.
• Discover hubs/stacked devices in the infrastructure.
• In-Depth inventory and threat discovery without an agent detailed than any of its competitor.
• Ability to integrate with any network device supporting remote connection without any dependency.
• Unprecedented scalability.
• Different methods for discovery and blocking.
• Easy discovery without depending on network devices or traffic sniffing.
Are There Any switch or network device requirements?
There are no special networking requirements to deploy NetCyte. The solution does not require the installation of any software in user machines. Sniffing or port mirroring is also not needed.
What are the competitive differences?
• NetCyte can do advanced threat analytics without needing an agent and appliance on remote networks.
• As the number of remote computers increases the agentless operation mode creates false alarms in competitor products.
• NetCyte can detect port scans and password breach attempts without an agent installation or requiring an appliance on remote networks.
• NetCyte can track important audit data without an agent.
• The implementation cycle is significantly lower.
• Customizable scripting interface for executing commands on network devices enables organisations to manage possible issues related to command execution much more effectively.
How does the NetCyte discover network devices?
The agentless technology provides accurate visibility with greater scalability thanks to our Windows-based platform. Any device in the network is discovered in real-time. The system is managed centrally without any components on remote network segments. NetCyte support discovery through ARP Tables, MAC Address Tables, ARP Broadcasts and Traffic Mirroring.
How does the NetCyte automation work?
The core function of netCyte is automation. Security profiles can be assigned to any device accessing the network. Any job can be initiated using customizable scripting interfaces supporting batch scripts, PowerShell and SSH.
How does NetCyte enforce organisational security policies?
By supporting any possible method of policy enforcement netCyte is a leader in policy enforcement. Network device configuration management, ARP redirection, 802.1X, TCP connection resetting are the main methods for enforcement.
What is the NetCyte Threat Discovery features?
• Processes Utilizing Network Ports
• Processes Creating Network Traffic
• Bandwidth Utilization Analysis
• Network Connection Analytics
• Port Scan Detection
• Password Breach Attempt Detection
• Weak SNMP Credential
• Discovery Weak Windows Credential Discovery
• Malware Discovery
• Malicious Driver Discovery
• Malicious Service Discovery
• Malicious Start-up Object Discovery
• Malicious Scheduled Task Discovery
How does NetCyte supply 100% visibility in your Network?
Every connected device is scanned for threats using remote connection protocols like SSH, SNMP, PowerShell, WMI and RPC. Device access is blocked if noncompliance detected.
Join the PartnerCyte inner Circle

We're member of 

We're member of

© 2019-2020 CyberCyte. All Rights Reserved.