VRAI delivers performance, protection, and privacy for your digital and physical life.
PERFORMANCE |
PROTECTION |
PRIVACY |
We optimize your computers and networks for reduced internet latency and faster speeds |
We provide 24/7 virus immunity protection with cyber and physical technology and service |
We provide 24/7 privacy protection with cyber and physical technology and services |
At VRAI we believe the war on privacy is real.
VRAI leverages the commitment of our customers, affiliates, agents, brokers, and technicians to protect families, homes, and small businesses.
With increased connectivity, comes increased risk. Children are also online and connected to the outside world, and protecting them from risks like cyberbullying and online predators is our priority. We build a custom, easy to use plan for our clients to ensure you and your family are protected.
VRAI's plan follows a "left of bang" approach to protecting your children, home, or business. We believe it is better to detect the risks early and respond offensively, instead of responding to devastating actions too late. This approach helps our customers avoid the "bangs" in the digital and physical security space. |
Our privacy campaign is focused on enabling you to go on the offense with a strong defense. The VRAI approach is to position you to avoid being compromised with a "left of bang" approach to defense-in-depth.
A defense in depth (also known as deep defense or elastic defense) is a strategy that comes from military science. VRAI merges military science with data science to discourage an attacker by constantly delaying them. Instead of defeating an attacker with a single, strong defensive line, the VRAI defense-in-depth follows tactics that cause the attacker to lose momentum over me. |
Once an attacker has lost momentum or is forced to spread out their efforts, VRAI delivers defensive counter-attacks mounted across four engagement areas.
ECOSYSTEM RISK |
PERIMETER RISK |
NETWORK RISK |
ENDPOINT RISK |
A VRAI defense-in-depth means we build traps and defensive counter-attacks, mounted on the attacker's weak points, with the goal being to cause attrition or drive the attacker back to their original starting position to keep you safe.
To ensure we improve your protection, we measure your risk using 4 zones of engagement. Each zone is how we sort the types of threats that you, your family or your business face. Our intelligent, interconnected technologies and services deliver virus immunity so you can rest assured your privacy is protected.
In order to progress your privacy campaign in an orderly fashion, we follow 6 steps that ensure we keep your children, family, home, or business safe.
We fight the global war on privacy so that you don't have to. Join us today and:
- Preemptively repair and clean your technology and data
- Preventively close the gaps before a hacker can exploit them
- Proactively keep your home, family, and business safe from evolving harm
PHASE 0 SHAPE |
PHASE 1 DETER |
PHASE 2 SEIZE |
PHASE 3 DOMINATE |
PHASE 4 STABILIZE |
PHASE 5 SUSTAIN |
|
||
PHASE 0
|
ECOSYSTEM RISK |
VRAI client members complete a short form. Using this data CrowdPoint:
|
PERIMETER RISK |
VRAI client members complete a short form if they would like to check their "hack-ability". Using this data CrowdPoint:
|
|
NETWORK RISK |
VRAI client members complete a short form if they would like to check the security of their Wi-Fi and internal networks. Using this data VRAI:
|
|
ENDPOINT RISK |
VRAI client members download unlimited PC, MAC, or Linux versions of our VRAI anyWare technology. Using this data VRAI:
|
|
|
At the end of Phase 0:VRAI delivers an assessment of your risk |
PHASE 1
|
||
PHASE 1
|
ECOSYSTEM RISK |
VRAI client members complete a short form. Using this data VRAI:
|
PERIMETER RISK |
VRAI Client Members complete a short form if they would like to check their "hack-ability". Using this data VRAI:
|
|
NETWORK RISK |
VRAI Client Members complete a short form if they would like to check their security of their Wi-Fi and internal networks. Using this data VRAI:
|
|
ENDPOINT RISK |
VRAI client members download unlimited PC, MAC, or Linux versions of our VRAI anyWare™ technology. Using this data VRAI:
|
|
|
At the end of Phase 1:VRAI delivers a customized plan for your protection. |
DEFENSE IN-DEPTH |
ECOSYSTEM |
PERIMETER |
NETWORK |
ENDPOINT |
|
PHASE 0 SHAPE
|
In Phase 0: VRAI surveys learns, assesses, and plans across your ecosystem, perimeter, network, and endpoint | ||||
CPT scans the Dark Web, Open Web & conducts a child predator search across your home & business ecosystem | |||||
|
Penetration (Hackability) Test | ||||
Internal network speed and safety assessment | VRAI™ Remote device and risk assessment | ||||
|
|||||
Customers join as home and/or business members |
PHASE 1 DETER |
Target sites with data and identify phishing and child predators | Close unwanted ports and secure their physical property | Consolidate passwords and update continuously | VRAI™ Onsite Returns devices to brand new, and vaccinate for virus immunity |
|
|||||
Home and Business Member removes threats |
PHASE 2 SEIZE |
Remove sites with data and identify phishing | Install a firewall and home security if necessary | Speed up and Secure digital and physical networks | VRAI™ Remote conducts vulnerability removal |
|
|||||
Home and business member plugs the gaps |
PHASE 3 DOMINATE |
Add identity theft protection as fail safe | Block TOR (dark web) and malicious traffic | Install VPN for more secure internet usage | VRAI™ Remote manages software patches |
|
|||||
Home and business members measure progress |
PHASE 4 STABILIZE |
Establish measures on protecting data and emails | Establish measures for perimeter protection | Establish measures on network protection | VRAI™ Remote delivers human monitoring |
|
|||||
Home and business members maintain and improve privacy |
PHASE 5 STABILIZE |
Maintain low profile | Maintain perimeter with 24/7 "eyes-on-glass" | Remain hidden online | Maintain endpoints with VRAI™ Remote |