Data breaches and intellectual property theft: By letting employees access sensitive information from home WiFi, personal laptops, and unauthorized cloud storage, organizations expose passwords, financial models, healthcare records, product designs, or other regulated data to potential theft.
Malware infections and network infiltration: Without IT approval or security vetting, shadow IT apps often contain vulnerabilities like malicious scripts, viruses, spyware, or ransomware. By infecting a personal device, cybercriminals can penetrate previously secure networks when that device reconnects on corporate premises. From here, threats quickly move laterally to compromise other on-site systems or launch attacks exploiting Active Directory and cloud credentials
CyviCo is the only solution available for remote working that protects a Companies Intellectual Property and satisfy CyberSecurity control, compliance and reporting requirements
Additionally, CyviCo provides Profiles guaranteeing Hard Isolation between personal and work data even on personal non-work provided machines. CyviZen & CyviCo Profile Isolation is total, and requires a physical reboot of the machine to switch profiles.
The only way unprotected data can be copied off a CyviZen when using a CyviCo profile without approval is via external visual recording device
This means that CyviCo knows and manages, who you are, on which authorised company profile is in use, and what data permissions are granted at all times.
Declarative Idempotent Builds
CyviCo has three distinct package stores available, see image to left.
CyviCo packages via ZenPkgs and CoPkgs are attested via Trustix ensuring
Binary Planting Protection
Tamper-Evident History
Agree on Inputs, Agree on Outputs
CoPkgs is exclusive to your use and only available within your organisation.
CyviCo can ensure that packages are distributed encrypted and only those people or machines authorised to use are able to. If you use trade secrets and have skilled engineers that can reverse compiled code this option is a must.
Anonymous Vaulted Storage
CyviCo ensures your data is protected by using BCacheFS to prevent filesystem replay attacks such that skilled remote developers or engineers are unable to rewind data in time on their system.
Additionally, per image. CyviCloud, an add-on to CyviZen offers Quantum Resilliant Storage via gocryptfs or cryfs depending on your specific needs. Every single folder, including nested folders within other folders can be stored to different physical locations per the Data Sovereignty Legislation that applies to your situation. Alternatively, P2P storage is also available. (CyviCloud does require an OnlyKey for use)
Total Control
Operating System
CyviCo and CyviZen for the most part provide sensible defaults, NixOS style Modules are used for App Configuration and you are free to override, disable, add or change any settings. CyviZen only prevents overriding settings that affect data ownership or system stability
This includes access to Linux Kernel modules and permissions. If your IT Policy disables USB, SD Readers, Cameras, Microphones it is all possible.
NOTE
CyviCo does not affect or influence the DeniZen profile in any way; they are totally isolated from eachother.
This includes hardware & Linux Kernel settings, what is overriden in Co is only done so in Co.
Additionally, as CyviCo augments CyviZen all updates are controlled by the DeniZen profile. For remote workers such as freelancers with many clients this ensures multiple Co profiles (up to 9) are available on the same machine.
Co profile can verify its version against the latest released by the Company and take appropriate action should an update be required. i.e. Deny Access to Data, Reboot into DeniZen profile
Unified Firewall & Transparent Split Proxy
OpenSnitch via extended Berkley Packet Filter (eBPF) for Application & System Filewall control.
eBPF and its power (only available in Linux Kernels) is an entire topic on its own see ebpf.io
CYN: Your Digital Self
An authoritative non-fudgible identity created for and by you. It sits above all other digital identities assigned to you by other governing bodies, affording you unprecedented protection and security in the digital world