An unprecedented level of cyber security based on synthesising benefits from two new patented technologies resulting in 100% prevention of malware and zero day attacks.

About

The GBMS Tech Ltd cyber defence system uses five unique cyber-metric fingerprints and the file’s size to positively identify any executable or script that tries to run. The system’s kernel security agent intercepts the loading of all executable files and scripts and positively verifies if they are authorised on the organisation’s Trusted Apps list.  If they are trusted, they run, if not, they are immediately blocked.  Even where an application is un-patched, GMBS Tech prevents malware from executing.  FCA approved, patented (March 2017), under written by Lloyds insurance underwriters, greatly assists GDPR compliance. GBMS Tech Ltd are Appointed Representatives ( firm reference number 784139 ) of Portcullis Insurance Brokers Ltd who are authorised and regulated by the UK Financial Conduct Authority ( firm reference number 526979 ) GBMS Tech "HPT" Host Protection Technology implements the priority one breach prevention solution recommended in the 35 point cyber defence strategy by the US, Australian and Canadian Governments. Blocks all malware immediately on installation which provides containment and preventing of further system infection. Blocks all unknown and un-trusted Apps by use of “Only Trusted Apps” technology.  Therefore, polymorphic malware is immediately neutralised. Blocks all ransomware / zero-day malware attacks even before they have been created by hackers, with no performance penalty. SHA-1 and SHA-2 (256,and 512 values) collision resistant. Prevents executable/ scripted malware attacks through un-patched / new security holes.  Prevents Fully Undetectable Malware (FUD) from executing. Instant visibility of all existing system infections through use of the SEIM management dashboard.        The advanced persistent threat (APT) Hunter-Killer can uncover existing or dormant (previously undetected) infections when used with the SEIM  management dashboard  Dramatically Reduces period of system cleansing due to the ability to isolate infected areas Also reduces financial implications of mitigating the loss of system access and therefore, productivity. Prevents all possible malware infections. Uses fundamental characteristic of malware plus ring-based architecture of operating system to block new binaries with 100% certainty. The GBMS 2-Man Rule prevents Lone Wolf  malicious insider attacks (ie, avoids a catastrophic repetition of the Snowden debacle). Protects MS Windows version 10, 8+, 7 Vista, XP, 2000 and all windows servers.  It is the only product that fully protects legacy systems in this way from NT4 / XP forward.  Therefore, extends life of unsupported legacy systems and avoids capital investment and repeat annual licence costs, loss of productivity, staff training costs through upgrading.  In effect “buying time” for the organisation. No signature file / white-list updates which reduces maintenance cost/time. Works without complex configuration management and does not require a re-boot following installation.  Therefore avoids consultancy costs and service disruption. GBMS Tech "HPT" Host  Protection Technology is a kernel level file filter driver with an extremely small footprint therefore saving valuable hard drive space.  Following download, GBMS Tech application does not require re-booting and therefore the associated down time disruption to productivity.  Suited to mobile devices and IoT. Zero performance degradation as the system is passive unlike traditional anti-virus applications which create performance conflicts during periods when they are scanning.  This is a critical benefit for time sensitive 24/7 performing organisations. Protection for Apple Mac systems due to be launched in Q4 2017. Produces an improvement in laptop battery performance of around 80% when compared to traditional anti virus applications as NO constant updates. Saves money  by reducing cost of maintained and electrical consumption. Notably lower costs when compared to traditional AV  and White or Black Listing suites. No SIEM cost as standard feature, no difference in costs between PC and server licences . Works with and compliments all known existing security products. Risk-free roll-out using Learning mode in a try-before-you-buy approach (works with your existing security products producing a defence-in-depth approach). Whilst we call it LEARNING mode, it is better described as AUDIT mode as it audits the existing system authorisations to legitimate security certificates and indicates any process running that does not, therefore these can be investigated as to the motive....legitimate scripting or unauthorised spy ware. Provides an audit faclirty for all licence applications and usage – can save licence renewal fees.  Threat Vector Analysis provides in-depth attack information, geographic and IP address profiling of attacks. Direct capability to back Zero Day attack information to the firewall. Imminent release of advanced firewall to work holistically with the ‘in-system’ capability to mitigate risks of DDoS and brute force attacks. Immediate Commercial Potential GBMS Tech is to launch an insured managed security provision aimed at SMEs to provide a complete end to end affordable solution in partnership with Portcullis , Equinox and Cosmos insurance where annual premiums will be typically discounted by 30% is businesses adopting the GBMS Tech solution as their primary cyber defence. GBMS Tech has secured sole provider position on a major SEZ project in Oman with MOU  Signed up 26th September 2017. GBMS Tech are currently providing cyber defence in major commercial companies within the UK and worldwide  GBMS Tech are in the prime position to provide cyber security to a European Homeland Security Government Department. Re-seller sales teams are now mobilised to target SMEs in wider Manchester area, Institute of Directors membership and Legal Society.  

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations