Current Cybersecurity Reality
As the world shifts to a more interconnected and internet driven society, the need to secure private online data is
becoming increasingly paramount. The open flow of information between various online channels makes both users
and organizations highly vulnerable to cyber hacking. Critical online data breaches are now reaching record highs
with millions of personal records being stolen each and every year.
Cyber attacks are also expanding their reach into new and emerging markets, such as cryptocurrency assets and
exchanges. In the past year alone, multiple cryptocurrency funds, worth over hundreds of millions, were hijacked by
online criminals. This makes protection for digital assets found within the cryptocurrency market a new top priority
for all users.
In order to counteract the growing cybersecurity concern, users must take action by safeguarding private data
flowing across all communications protocols (i.e. email, websites, mobile devices, cryptocurrency exchanges, etc.).
However, the implementation and management of multiple security solutions can be an extremely difficult task due
to fundamental issues present in the market, which ultimately inhibits users from fully embracing the widespread
adoption of cybersecurity.
Issues Facing End Users
The information security market as a whole is in need of a major paradigm shift with an emphasis on efficiency,
transparency, and trust. This is due to a variety of issues that users face within the cybersecurity market.
Oversaturation of Security Solutions
The need to secure data across numerous online channels has led to the oversaturation of solutions made available
to users. Currently, there are more than 1,600 solutions offered in the cybersecurity market worldwide, which
makes the selection process for each security solution overly complicated. Users are usually left to their own
devices to properly test, judge, and select from a sea of providers that offer similar solutions. Also, the
management of these diverse solutions can be quite burdensome as users are forced to adapt to drastically
different security platforms, software, settings configurations, pricing, etc.
The idea of taking a layered approach to cybersecurity, as outlined above, is simply inefficient and outdated.
Studies show that some organizations use up to 70 different vendor made security solutions in order to solve a
host of information security related issues. Deploying more security solutions does not necessarily lead to higher
security. In fact, utilizing an excess of solutions could leave users even more susceptible to hackers as users must
be cognizant of system upgrades and security bugs found in each respective software.
For many users, cybersecurity is a very foreign and complicated subject. This leads to vendors taking advantage of
users’ lack of knowledge by flooding the market with an overabundance of security solutions. Security providers
should no longer look to profit off user naivety and instead should focus on building consolidated solutions that
allows users to truly feel secure online.
Centralized Threat Intelligence Data
Another issue present in the information security market is the lack of transparency over threat intelligence data.
By providing servicing to end users, cybersecurity vendors are able to collect vast amounts of emerging cyber
threat information, such as attack patterns and behaviors, malicious IP addresses, identification of malware
infected files, etc. However, threat intelligence data compiled through security servicing is not made accessible for
Vendors typically privatize this information and use it for their own personal gain. For instance, cyber threat data is
used to help develop new market solutions, issue pertinent software updates, create industry reports and analytics,
etc., all of which can be valuable sources of revenue. On the other hand, users who help generate this data for
vendors are left with little to no compensation and are forced to continue paying for vendor made services. This
uneven centralization of threat data and lack of compensation must come to an end.
Rather than profiting from the security community, cybersecurity vendors must become active leaders on behalf of
the community by making security intelligence open and accessible to all. Also, users should be encouraged and
incentivized to secure their digital assets to promote a more trusted online society.
Uncertainty of Security Performance
Lastly, the current organization of the cybersecurity market makes it very difficult to discern the effectiveness of
various vendor made solutions. As mentioned above, the market is highly saturated with an excess of information
security vendors and solutions. The only way for users to properly distinguish vendor performance is through direct
testing of these solutions. However, this can be an extremely resource intensive and costly ordeal.
Users typically need to invest both time and money in order to learn about a particular security solution, measure
its respective performance, then decide whether it will be easy to manage and deploy. However, general end users
and small businesses may not have the necessary resources and capabilities to test multiple security solutions all at
once. This leaves enterprise organizations as the only target audience that can enjoy access to the full spectrum of
security that every user needs.
Additionally, cybersecurity vendors tend to excessively promote their security capabilities, but many lack industry
experience or high performance working products to become a trusted security vendor. This is especially true
within the ICO arena where many fraudulent companies and vendors with limited security expertise run rampant.
Cloudbric’s primary mission is to revolutionize the cybersecurity market by making information security open and
accessible to all users through the introduction of a new Decentralized Universal Security Platform. This AI-based
cybersecurity platform will be powered by Cloudbric’s patented deep learning module known as VISION and will
provide an all-inclusive suite of cybersecurity solutions, as well as the development of a new decentralized security
Furthermore, users will be able to train the very technology that helps protect their online digital assets by
contributing anonymous cyber threat logs to advance the accuracy and learning capabilities of Cloudbric’s deep
learning module. For their continued security contributions, users will be rewarded through the free distribution of
Cloudbric cryptocurrency (CLB) tokens directly to their user account.
CLB can then be redeemed to activate Cloudbric’s suite of security services. A minimum balance of CLB tokens
must be deposited or accumulated within each user account wallet in order to utilize all security services.
Additionally, users may utilize CLB to gain access to exclusive offers from Cloudbric’s extensive global partnership
network known as the Secure Web Alliance.