What are the typical resource requirements (CPU, RAM, Network) for the Cybernatics agent/sensor on endpoints?
The lightweight endpoint sensor requires minimal CPU/RAM (est. 2–5% CPU, 150–250MB RAM) and uses low-bandwidth communication for event forwarding.
Will running Cybernatics continuously impact our computers' and servers' performance or speed?
No. The agent is optimized for performance and runs unobtrusively, ensuring negligible impact on user productivity or system speed.
How does Cybernatics' AI-driven anomaly detection compare to traditional signature-based antivirus or next-generation antivirus (NGAV)?
Traditional AV relies on known signatures. Cybernatics uses AI models and behavioral analytics to detect unknown, fileless, and zero-day threats — far more effective for modern attacks.
Beyond malware and ransomware, what other specific types of threats does Cybernatics detect (e.g., fileless attacks, insider threats, zero-day exploits)?
Ransomware & malware, Fileless attacks , Insider threats, Privilege escalation, Lateral movement, Vulnerability exploitation, etc.
How does Cybernatics handle potential false positives? Is there a process for tuning or whitelisting?
It includes whitelisting options for legitimate software or behavior, ensuring low false-positive rates with the ability for human oversight.
How frequently are the AI models and threat intelligence databases updated?
AI models and threat feeds are updated continuously via the cloud, leveraging collective intelligence and external feeds.
What specific data does Cybernatics collect from our endpoints and network to perform its analysis?
Cybernatics collects: Event logs, Process activity, File hashes, Network connections , Threat indicators (e.g., anomalies, malware detections)
How does Cybernatics ensure the privacy and security of the data it collects? Where is this data stored?
All data is encrypted at rest and in transit. For SaaS, data is stored in secure, region-compliant cloud infrastructure — details available upon request based on location.
Can Cybernatics alerts and data be integrated with our existing Security Information and Event Management (SIEM) system or other security tools?
Yes, Cybernatics provides API access to integrate with external SIEMs, SOARs, and EDRs. (I do not suggest we even mention this as it is very intrusive and needs high degree of customization)
What level of control do administrators have over policies and response actions within the Cybernatics platform?
Policies and responses are predefined out of the box with little to no need for admins to manage this is to take the workload off the IT and security teams.
Are there features to prevent end-users or unauthorized individuals from tampering with or uninstalling the Cybernatics agent?
Yes. The agent includes tamper protection, and only authorized users with admin access can uninstall or modify its settings.
Does Cybernatics support Multi-Factor Authentication (MFA) for accessing its management console?
This is currently on our roadmap
Does Cybernatics offer Managed Detection and Response (MDR) services, or is it primarily a platform for our internal team to manage?
Cybernatics can offer MDR services if the customer prefers.
What kind of technical support is available for Cybernatics customers?
Cybernatics has a 24/7 Chatbot and the traditional level of customer support
What are the key functional differences between Cybernatics Start (SaaS) and Cybernatics Enterprise, apart from deployment options?
Cybernatics Start (SaaS) is designed for small and medium-sized businesses seeking quick, affordable, and enterprise-grade security without the complexity of on-premises setups. It’s a fully cloud-based solution that offers plug-and-play deployment, built-in SIEM/XDR capabilities, and simplified management — ideal for lean IT teams. On the other hand, Cybernatics Enterprise is tailored for larger organizations with more complex environments and compliance needs. It supports hybrid and on-premises deployments, offers deep integration capabilities with existing infrastructure, and provides full internal and external threat visibility. While Cybernatics Start delivers rapid protection out of the box, the Enterprise version offers the flexibility and customization needed for highly regulated or large-scale environments.