COLLATERAL

Awards & Reviews | Videos | Data Sheets | Reports | Case Studies | Briefs | Podcasts | White Papers | Infographics

Awards & Reviews

IT Central Station: PARANOID Product Review
Cybersecurity Insiders Product Review: PARANOID
Cyber Defense Magazine – Innovator in Endpoint Security for 2018
Cyber Defense Magazine – Top 50 Cyber Security Leaders of 2017
Nyotron – EMA 2017 Vendor to Watch
Nyotron PARANOID: SC Magazine 5-Star Review

Videos

Security Guy Radio with Nir Gaist – Black Hat 2018 – Video
Ingram Micro Cloud Summit 2018: Nir Gaist Keynote Security is Easy
» WATCH NOW
ECS London 2017 Ben Wheeler Video
» WATCH NOW
Security Guy Radio with Nir Gaist Video
» WATCH NOW
PARANOID Prevents “Petya-like” Ransomware Video
» WATCH NOW
WannaCry Ransomware Attack Video
» WATCH NOW
Nyotron Introduction Video
» WATCH NOW

Data Sheets

Nyotron PARANOID
Your Antivirus Isn’t Dead: Supercharge it with Nyotron’s PARANOID
Nyotron and Windows 10
The Nyotron Advantage
Nyotron PARANOID Data Sheet
Nyotron PARANOID for Servers Data Sheet
Nyotron Managed Defense Services Data Sheet

Reports

Attack Response Center: Windows 10 Controlled Folder Access Vulnerabilities
Attack Response Center: SamSam Ransomware Report
Attack Response Center: OilRig Report
Attack Response Center: Operation Copperfield Malware Report
Attack Response Center: CryptoMix Arena Malware Report
Attack Response Center: BadRabbit Malware Report
Attack Response Center: WannaCry Ransomware Report
Comsec Global Performance Report
Attack Response Center: “Petya-like” Ransomware Analysis

Case Studies

Nyotron Haifa University Case Study
Nyotron El Al Airlines Case Study

Briefs

Healthcare Solution Brief
Nyotron PARANOID: OS-Centric Positive Security
Nyotron PARANOID: SC Magazine 5-Star Review
Nyotron Threat Brief: Coping With Ransomware
Threat-Agnostic Defense Solution Brief

Podcasts

A New Perspective On Endpoint (Nyotron)
Why Machine Learning is More Likely to Cure Cancer Than to Stop Malware
Chipocalypse Now with Keith Koo & Nir Gaist, CTO of Nyotron
Equifax: It Could’ve Been Prevented

White Papers

The State of Endpoint Security: Past, Present and Future
The Life of a Zero Day
Is Your Endpoint Security Strategy Too Negative?
Why Machine Learning May Cure Cancer Before It Stops Malware

Infographics

Operation Copperfield: Behind the Smoke and Mirrors
OilRig is Back with Next-Generation Malware