CloudCyte for the Remote Workforce


Agentless Collection of Artifacts Like Sysmon and Autoruns 

Working from home has become common with the emergence of COVID-19. It is expected that many organizations will continue to utilize their workforce remotely even after COVID-19 is over.

Organizations are seeking new solutions to secure their remote workforce through a simple, effective, and integrated platform. CloudCyte is designed to provide 360° Security for large enterprises and SMB’s, whether their users are accessing corporate data from personal or business devices.

Challenges Organizations are Facing

Users are continuing to receive malicious e-mails whichever security solution is deployed.
It is not easy to increase the awareness level of the end-users. Accessing corporate data from
personal devices cannot be avoided.
As more services are available from the cloud, VPN is not sufficient to provide secure access to corporate data.

How is CloudCyte Addressing Above Challenges?

When a user accesses corporate data through a VPN, two-factor authentication is performed to enable zero-trust secure access without requiring agents on end-user devices. The device can be checked for compliance, and access from non-business devices can be blocked automatically.
For secure access, users are provided with a lightweight desktop and mobile agent. If malicious activity is detected in their device or e-mail inbox, they are immediately notified, and their network access can be blocked seamlessly. The agents are supported for Windows, MAC, IOS and Android devices. End-users can install the provided agents through a single click for their personal devices. For corporate devices, central installation is available.
By utilizing a Microsoft Outlook plug-in, the end-users are notified of malicious e-mails automatically. Additionally, users can report other activity that they believe is suspicious for centralized analysis. The artificial intelligence engine and the security administrators analyze incoming e-mails. Once flagged as malicious, the e-mail is deleted from all user mailboxes seamlessly.

Key Differentiators

Easy deployment with minimum maintenance overhead without requiring support services. 24/7 technical assistance when requested.
Competitive pricing model offering protection for both personal and business devices.
Agent based and agentless deployment options.
Support for self-installation through the user guidance wizard, videos and simple guides.
Single platform for network and e-mail security.
The Microsoft Outlook plug-in can automatically scan every e-mail for threats and protect the user within the e-mail application for better user experience and increased productivity.

How CloudCyte Works for the Remote Workforce?

1. For detecting phishing e-mails, a Microsoft Outlook plug-in is centrally deployed from Office 365 and Microsoft Exchange Server.

2. When a user connects to corporate VPN, CloudCyte DNS Servers are enforced. The user is redirected to a captive portal for two-factor authentication and compliance checks.

3. Only compliant devices are allowed network access.

4. For authenticated devices, if malicious activity is detected, the user is notified. Optionally, VPN access can be blocked and redirected to CloudCyte Captive Portal for notification. The administrator can grant access through the CloudCyte Portal.

1. Users receive an e-mail containing a link for the agents. Currently, Windows, MAC OS, IOS and Android devices are supported. For corporate devices, agents can be deployed centrally.

2. The agent installs the Microsoft Outlook plug-in for automatically identifying malicious e-mails. The users are also able to report any e-mail they suspect.

3. The agent continuously checks and blocks malicious activity. In the case, any security risk is detected, the user is notified.

4. For any agent installed device, a compliance check is performed. Any inventory information of the device can be collected. Two-factor user authentication can also be enforced for compliance. If not compliant, the user is notified, and network access of the device is blocked.


Can the solution be deployed on-premises?
Yes. CloudCyte provides full support for on-premise deployment.
How is malicious traffic identified?
Any communication to the Internet starts with a DNS Query. The system acts as a DNS Server to identify any malicious communication.
What types of plug-ins are supported for e-mail analysis?
Currently Office365, Microsoft Exchange Server and Google Mail are supported for central agentless deployment. There is no requirement to install any end-user component. The plug-in enables the end-user to automatically audit and report any incoming e-mail for security risks. Office365 and Microsoft Exchange Server based plug-in supports Microsoft Outlook for Windows, MAC, IOS and Android. Google Mail based plug-in is available for browser-based access. In the agentless mode, the plug-in will be active for the configured e-mail account.

An agent based Microsoft Outlook plug-in is also available to enable automated scanning of all incoming e-mails for phishing risk. End-user based plug-in enables the scanning of any e-mail account accessed from Microsoft Outlook for Windows.

For on-premises deployments is an agent-free deployment possible for threat analysis?
Yes. CloudCyte offers an on-premise DNS relay component. DNS relay can act as an internal DNS or act as a broker to intercept a DNS query to forward the requests to an internal DNS server. The component is also able to analyze internal logs of DNS servers like Microsoft DNS, F5, Infoblox and BIND.

More information is available from the link

What are the benefits the solution provides to MSSP's?
CloudCyte offers complete data privacy by making it possible to deploy all CloudCyte components to the MSSP’s data center and provide white-labelling support.

More information is available from the link

Holistic Threat Hunting for Stealth Cyber Attacks
CloudCyte provides free phishing attack simulator up-to 250 users and free trial of all features for thirty days.
Would you like to learn more about how to protect your business?

We're member of

We're member of

© 2019-2020 CyberCyte. All Rights Reserved.