What is CrowdPoint's Product or Service?

CrowdPoint delivers performance, protection, and privacy for your digital and physical life.

PERFORMANCE

PROTECTION

PRIVACY

__Velocity

__Protect

__Privacy_observed_disturbed

We optimize your computers and networks for reduced internet latency and faster speeds

We provide 24/7 virus immunity protection with cyber and physical technology and service

We provide 24/7 privacy protection with cyber and physical technology and services

 

At CrowdPoint we believe the war on privacy is real.  

CrowdPoint leverages the commitment of our customers, affiliates, agents, brokers, and technicians to protect families, homes, and small businesses.

With increased connectivity, comes increased risk. Children are also online and connected to the outside world, and protecting them from risks like cyber bullying and online predators is our priority. We build a custom, east to use plan for our clients to ensure you and your family are protected.

__ Left of Bang CrowdPoint's plan follows a "left of bang" approach to protecting your children, home, or business. We believe it is better to detect the risks early and respond offensively, instead of responding to devastating actions too late. This approach helps our customers avoid the "bangs" in the digital and physical security.

Our privacy campaign is focused on enabling you to go on the offense inside of a strong defense.  The CrowdPoint approach is to position you to avoid being compromised with a "left of bang" approach to defense-in-depth.

A defense in depth (also known as deep defense or elastic defense) is a strategy that comes from military science.  CrowdPoint merges military science with data science to discourage an attacker by constantly delaying them. Instead of defeating an attacker with a single, strong defensive line, the CrowdPoint defense-in-depth follows tactics that cause the attacker to lose momentum over me.   __Defense In Depth (1)

Once an attacker has lost momentum or is forced to spread out their efforts, CrowdPoint delivers defensive counter-attacks are mounted across four engagement areas.

__Ecosystem RiskECOSYSTEM RISK

__Perimeter RiskPERIMETER RISK

__Network RiskNETWORK RISK

__Endpoint Risk-1ENDPOINT RISK

A CrowdPoint defense-in-depth means we build traps and defensive counter-attacks, mounted on the attacker's weak points, with the goal being to cause attrition or drive the attacker back to their original starting position to keep you safe. 

To ensure we improve your protection, we measure your risk using 4 zones of engagement.  Each zone is how we sort the types of threats that you, your family or your business face.   Our intelligent, interconnected technologies and services deliver virus immunity so you can rest assured your privacy is protected.

In order to progress your privacy campaign in an orderly fashion, we follow 6 steps  that ensure we keep your children, family, home, or business safe.

We fight the global war on privacy so that you don't have to. Join us today and:

  • Preemptively repair and clean your technology and data
  • Preventively close the gaps before a hacker can exploit them
  • Proactively keep your home, family, and business safe from evolving harm
__ShapePHASE 0
SHAPE
__DeterPHASE 1
DETER
__SeizePHASE 2
SEIZE
__Dominate PHASE 3
DOMINATE
__StabilizePHASE 4
STABILIZE
__SustainPHASE 5
SUSTAIN
 
 

__Shape
PHASE 0
SHAPE

During Phase 0: CrowdPoint (CPT) surveys, learns, assesses, and plans across your ecosystem, perimeter, network, and endpoint privacy engagement areas

 

__ShapePHASE 0
SHAPE

__Ecosystem RiskECOSYSTEM RISK

CrowdPoint client members complete a short form.  Using this data CrowdPoint:

  • Scans the Dark Web, and Open Web
  • Conducts a child predator search across your home & business ecosystem. 
  • Provides a member a link for their friends and family to get an assessment done 

__Perimeter RiskPERIMETER RISK

CrowdPoint client members complete a short form if they would like to check their "hack-ability".  Using this data CrowdPoint:

  • Scans their digital perimeter using a penetration test
  • Conducts a quick physical survey 
  • For businesses, we conduct a compliance survey 

__Network RiskNETWORK RISK

CrowdPoint client members complete a short form if they would like to check the security of their Wi-Fi and internal networks.  Using this data CrowdPoint:

  • VRAI anyWare (see below) scans the internal network
  • Conducts a quick physical survey 
  • For businesses, we conduct a quick compliance survey 

__Endpoint Risk-1ENDPOINT RISK

CrowdPoint client members download unlimited PC, MAC, or Linux versions of our VRAI anyWare technology.  Using this data CrowdPoint:

  • Scans their vulnerabilities
  • Conducts a patch and speed test survey 
  • For businesses, we conduct a quick compliance survey 

__Compliance (1) (1)

At the end of Phase 0:

CrowdPoint delivers an assessment of your risk

 

 

 

__DeterPHASE 1
DETER

During Phase 1: CrowdPoint (CPT) surveys learns, assesses, and plans across your ecosystem, perimeter, network, and endpoint privacy engagement areas

 

__DeterPHASE 1
DETER

__Ecosystem RiskECOSYSTEM RISK

CrowdPoint client members complete a short form.  Using this data CrowdPoint:

  • Scans the Dark Web and Open Web
  • Conducts a child predator search across your home & business ecosystem. 
  • Provides a member a link for their friends and family to get an assessment done 

__Perimeter RiskPERIMETER RISK

CrowdPoint Client Members complete a short form if they would like to check their "hack-ability".  Using this data CrowdPoint:

  • Scans their digital perimeter using a penetration test
  • Conducts a quick physical survey 
  • For businesses we conduct quick compliance survey 

__Network RiskNETWORK RISK

CrowdPoint Client Members complete a short form if they would like to check their security of their Wi-Fi and internal networks.  Using this data CrowdPoint:

  • VRAI Anywhere (see below) Scans their internal network
  • Conducts a quick physical survey 
  • For businesses, we conduct a quick compliance survey 

__Endpoint Risk-1ENDPOINT RISK

CrowdPoint client members download unlimited PC, MAC, or Linux version of our VRAI anyWare™ technology.  Using this data CrowdPoint:

  • Scans their vulnerabilities
  • Conducts a patch and speed test survey 
  • For businesses, we conduct a quick compliance survey 

__Compliance (1) (1)

At the end of Phase 1:

CrowdPoint delivers a customized plan for your protection.

 


 

Introducing a Privacy Campaign that delivers a real Defense-in-Depth.

A "LEFT OF BANG" PLAN THAT DELIVERS A CHILD, FAMILY, AND BUSINESS DEFENSE IN-DEPTH

DEFENSE IN-DEPTH

__Defense In Depth (1)

ECOSYSTEM__Ecosystem Risk

PERIMETER__Perimeter Risk

NETWORK__Network Risk

ENDPOINT__Endpoint Risk-1

 
__ShapePHASE 0
SHAPE

 

 

In Phase 0: CrowdPoint (CPT) surveys learns, assesses, and plans across your ecosystem, perimeter, network, and endpoint
__Ecosystem Risk CPT scans the Dark Web, Open Web & conducts a child predator search across your home & business ecosystem

__Perimeter Risk

Penetration (hackable) Test
      Internal network speed and safety assessment VRAI™ Remote device and risk assessment

 

         

Customers join as home and/or business members

__DeterPHASE 1
DETER
Target sites with data and identify phishing and child predators Close unwanted ports and secure their physical property Consolidate passwords and update continuously VRAI™ Onsite Returns devices to brand new, vaccinate for virus immunity

 

         

Home and Business Member removes threats

__SeizePHASE 2
SEIZE
Remove sites with data and identify phishing Install a firewall and home security if necessary Speed up and Secure digital and physical networks VRAI™ Remote conducts vulnerability removal

 

         

Home and business member plugs the gaps

__Dominate PHASE 3
DOMINATE
Add identity theft protection as fail safe Block TOR (dark web) and malicious traffic Install VPN for more secure internet usage VRAI™ Remote manages software patches

 

         

Home and business members measure progress

__StabilizePHASE 4
STABILIZE
Establish measures on protecting data and emails Establish measures for perimeter protection Establish measures on network protection VRAI™ Remote delivers human "eyes on glass"

 

         

Home and business members maintain and improve privacy 

__SustainPHASE 5
STABILIZE
Maintain low profile Maintain perimeter with 24/7 "eyes-on-glass" Remain hidden online  Maintain endpoints with VRAI™ Remote