Whereas most cybersecurity corporations pour sources into AI fashions, huge compute, hoovering up all the information, and enhanced analytics to detect and forestall threats, Frenetik, a Maryland cyber startup, is betting on one thing easier: ensuring attackers don’t know what defenders know.
The corporate emerged at this time with a essentially completely different method utilizing novel cyber deception and a newly issued U.S. patent to again it.
“The trade has turned cybersecurity right into a compute and evaluation warfare,” stated founder Hans Ismirnioglou. “Greater fashions, extra knowledge, quicker evaluation. However you may’t out-compute or out-analyze an adversary ceaselessly. We’re not attempting to. We’re exploiting data asymmetry.”
Conventional deception instruments deploy faux methods, look forward to attackers to seek out them, and hope they work together. Frenetik’s patented “Deception In-Use” expertise (U.S. Patent 12,463,981 – “Techniques and Strategies for Counter-Reconnaissance in Cloud Infrastructure to Disrupt Adversarial Concentrating on”) takes a unique path: it constantly rotates really used identities and sources throughout Microsoft Entra (M365), AWS, Google Cloud, and on-premises environments. The important particulars of who modified, what modified, when, the place, and the way journey by out-of-band channels accessible solely to trusted events.
Defenders keep knowledgeable. Attackers work from stale intelligence. “Adversaries, particularly AI-driven ones, construct fashions based mostly on reconnaissance. They assume the surroundings they mapped earlier is the surroundings they’ll exploit at this time,” Ismirnioglou defined. “We break that assumption without having an even bigger GPU cluster by merely depriving them of simply discoverable data.”
Customers can consider it as musical chairs for hackers: by the point they work out the place to sit down, the whole lot has moved—and solely defenders know which chairs are actual and which have grow to be traps.
The expertise transforms current deception instruments from passive traps into lively ones. When Frenetik rotates actual sources, attackers following stale intelligence get funneled straight into honeypots and decoys, supercharging interplay charges with basic deception parts that beforehand solely hoped to look actual. In contrast to options requiring in depth tuning or analyst oversight, Frenetik works as a result of attackers merely lack the data wanted to know the distinction.
“I need the adversary to need to constantly put a devoted physique onto each goal they go after – no extra free lunches or straightforward days for America’s adversaries,” says Ismirnioglou.
About Frenetik
Frenetik, a Maryland-based cybersecurity startup, simply emerged from stealth with a brand new method: as a substitute of flooding defenders with extra knowledge, it starves attackers of the data they should transfer. Centered on measurable security outcomes, and pricing transparency, Frenetik is constructed to tip the stability of energy by denying adversaries reliable perception into focused environments. Frenetik presents a free group model at www.frenetik.us.
Contact
Founder
Hans Ismirnioglou
Frenetik
information@frenetik.us



