An innovative electronic solution for…

Data security is the biggest challenge facing companies around the world. Boundaries are disappearing and attackers have targeted the most vulnerable points of any infrastructure – endpoints.

The combination of human error, outdated software solutions, and the inability to respond and monitor events in a timely manner has gradually turned endpoints into the weakest link in the cybersecurity chain. Traditional methods of endpoint protection are really flawed. They rely on an outdated model, where they can only detect what is already known. Attackers are fully aware of these limitations, so they exploit them with incredible success.

Attackers can easily access and study any security solution and find a way around it.

The first step to effectively understanding the attack is to discover it. ReaQta-Hive combines three powerful technologies to make attack detection effective, fast and reliable. This step is fully automated and flexible. All local knowledge gained during the response phase is then transferred to the detection algorithms.

Override established frameworks for operating systems

ReaQta is based on the NanoOS operating system, the first in the world to run outside the operating system’s address space (Ring 0), more precisely in the Ring -1 space. Due to its superior logical location, NanoOS is invisible to threats, protecting the detection layer from both identification and unauthorized interference, as NanoOS cannot be accessed from within the operating system.


ReaQta-Hive enables the creation of behavioral policies that can be activated in cases where protection takes precedence over discovery and tracking. Behavioral policies use artificial intelligence (AI) to immediately block any identified threat based on its behaviour, as will all similar threats in the future. When traditional methods are ineffective, the behavioral approach offers a unique solution to protect the infrastructure, for example, in cases where malware attacking memory has been used or when an event cannot be associated with a specific IP address or ID hash.


The advantage of a proxy-based solution over a network-based solution is that all digital evidence created by a device can be unconditionally traced back to its origin. Network monitoring provides limited visibility: traffic can be encrypted when it is not, but only information about device-generated traffic is obtained. With ReaQta-Hive, it is possible to link each piece of information to its source and answer questions about who creates the data and why.

This means that analysts can monitor which process is performing a particular activity, where, when and who started the process.


NanoOS is built with real-time performance in mind. It gains a lot of performance at the expense of hardware acceleration and isolation that modern processors provide. NanoOS uses only 8MB of RAM while booting, and older generation processors load between 0.5% and 0.7% while booting. The local AI uses an average of 20 MB of RAM. The effect of the proxy on the system is minimal, with no noticeable difference in user experience. The amount of data transferred under normal conditions ranges from 10 to 15 megabytes per day up to the endpoint.

the background

The AI ​​processing unit and database server are adapted to the number of endpoints. As a rule, an octa-core system with 64 GB of RAM and 4 TB of storage is enough for up to 3000 endpoints, which is enough for 6 months of data storage. ReaQta will provide detailed specifications for each installation, and its network of partners will take care of connecting devices when needed.

In a world where threats adapt faster than countermeasures, AI is proving to be an incredibly powerful ally capable of recognizing new conditions without any prior knowledge. The ability to learn from human experience is an important advantage over any established security approach.

If you’d like to learn more about IBM ReaQta, you can also check out the offer on IBM partner sites such as Alem Sistem, Unistar.PRO, Arhides and Smartisans.

You can find more at (Public relations)

Leave a Reply

Your email address will not be published. Required fields are marked *