Version 1.2 website shown. Currently at v2.1 - More options and dark theme.
"Just because the tiger hasn't bitten you doesn't mean it won't. And when it does it'll hurt."
On conventional business IT systems, by the time you detect signs of a breach it's almost certainly too late to prevent major operational flow disruption and big costs.
Preventing and limiting business operational flow disruption is what really matters. Because the cost of prevention is far less than the cost of recovery.
A US IT security company has found that only around 10% of business IT breaches get publicly reported, so the risk is much greater than generally assumed and the safety margins much smaller.
It's also still very much the case that "one wrong click and you're gone".
Thus there's an urgent need to identify and eliminate the safety gaps.
Gaps those selling 'security' subscriptions have little incentive to eliminate.
But we've done so very effectively. Our full solution involves MDFS and DF plus a range of techniques and adjustments.
Read on to learn how you can keep your business operational in spite of malware outbreaks.
We can provide a free MDFS Test Drive for potential business clients. English-speaking ones initially.
Each Test Drive starts with a fresh MDFS VM running on our server. You'll need to install a Wireguard VPN client on your workstation and configure it to connect to the VM. We provide configuration details.
To make efficient use of resources we respond to what we consider to be credible requests from businesses. So if a Test Drive interests your business please make a request containing some details of your IT situation.
Implementing our full solution will save some adoptees millions of dollars, and in some cases save the business itself. Because copious evidence [ 1, 2, 3, 4 ] supports the assertion that for business users of MS-Windows the question is when, not if, a major malware invasion will occur.
You're sceptical that MDFS (in particular) can do what nobody else seems able to do reliably.
Well, MDFS is non-Windows so we don't have to contend with the 'Windows high background-noise level'. Giving us an excellent Signal-to-Noise Ratio (SNR) when looking for signs of workstation malware 'playing with' the shared files.
Its own robustness in greatly enhanced both by being naturally immune to Windows malware and by SELinux. Note that MS-Windows doesn't have any mechanism that's even close to SELinux's capabilities.
Background information and FAQs are here.
Terms and Conditions are here.
To avoid giving potential attackers more clues here, you'll need to request further details.
©2021-2024 : IOPEN Technologies Ltd - NZ