VISS

About the company:
Patented Cybersecurity Hardware. We physically decouple the datastream between the Internet and your (to be protected) Endpoint Device. Dual Use product (currently prototypes mostly used in Military and CRITIS projects)
With its flagship product, the VISSBOX, VISS focuses on offering a robust hardware-based defense mechanism against malware and other cybersecurity threats. By addressing vulnerabilities that traditional software-based security systems fail to fully cover, VISS aims to empower individuals and organizations to freely use the internet and public networks without compromising their data or digital assets. VISS does not only have the ambition to render the internet usage of enterprise customers safer, but to democratize this technology and roll it out the private customers as well. The vision is to someday become an essential built-in component for all PC´s (like Wifi/Bluetooth Antennas, Graphic Cards etc.) tackling our ever-growing need for cybersecurity.
Innovations:
Cybersecurity
The VISSBOX stands out in the cybersecurity land-scape through its patented technology (fully granted, opposition period ended 09/2023), which combines several innovative components: im-agery treatment, advanced data transfer methods, physical decoupling, and built-in redundancy. This unique combination allows the VISSBOX to act as an intermediary between the user’s device and the network, handling network connections and data streams while keeping the protected endpoint PC isolated from potential threats. Or simply, VISS-BOX is the “Condom for your PC”.
Central to its design are two core Modules: 1) The Communication Module and 2) The Victim Mod-ule. The latter which enables connections to net-works and executes tasks like web-browsing, email work etc. runs on an Immutable OS (e.g. a modified Vanilla OS or Windows Enterprise). This Victim Module is reset to its initial state every time it powers on, ensuring that any potential compro-mise is entirely wiped out before each new ses-sion. A download from the Victim Module to the Communication Module as well as from the Victim Module via the Communication Module to the Endpoint Users PC is physically impossible. More detailed descriptions of the exact process are cur-rently non-public given further pending IP´s.