We designed, developed and patented an embedded device, (deception platform), which detects an unauthorized connection/cyber attack or malicious activity utilizing legitimate communications, extracts the communications' payload out of the active process buffers (memory/sockets), converts the payload to a benign hexadecimal (harmless) format, then transmits the cyber data to a defined (customer) device at the time the cyber attack/malicious activity BEGINS.
Cyber Detection Services Inc.
Edit to add your HTML.
The two flow diagrams below represent:
What the malicous IP address targeting the networks detect at the source of the attack/legitimate communications excuting malicous activity
What is actually happening at the destination (target) of the attack/legitimate communications executing malicious activity
Next "Wave" in Technology - Post Cloud Computing - IoT intelligent devices that can reside on "The Edge" of networks, which can also seamlessly integrate into existing cloud and traditional networks.