
Whereas most cybersecurity firms pour sources into AI fashions, huge compute, hoovering up all the info, and enhanced analytics to detect and forestall threats, Frenetik, a Maryland cyber startup, is betting on one thing easier: ensuring attackers don’t know what defenders know.
The corporate emerged in the present day with a essentially totally different method utilizing novel cyber deception and a newly issued U.S. patent to again it.
“The business has turned cybersecurity right into a compute and evaluation battle,” stated founder Hans Ismirnioglou. “Greater fashions, extra knowledge, sooner evaluation. However you possibly can’t out-compute or out-analyze an adversary perpetually. We’re not making an attempt to. We’re exploiting data asymmetry.”
Conventional deception instruments deploy faux techniques, await attackers to seek out them, and hope they work together. Frenetik’s patented “Deception In-Use” know-how (U.S. Patent 12,463,981 – “Techniques and Strategies for Counter-Reconnaissance in Cloud Infrastructure to Disrupt Adversarial Concentrating on”) takes a special path: it repeatedly rotates truly used identities and sources throughout Microsoft Entra (M365), AWS, Google Cloud, and on-premises environments. The essential particulars of who modified, what modified, when, the place, and the way journey by means of out-of-band channels accessible solely to trusted events.
Defenders keep knowledgeable. Attackers work from stale intelligence. “Adversaries, particularly AI-driven ones, construct fashions based mostly on reconnaissance. They assume the setting they mapped earlier is the setting they’ll exploit in the present day,” Ismirnioglou defined. “We break that assumption while not having an even bigger GPU cluster by merely depriving them of simply discoverable data.”
Customers can consider it as musical chairs for hackers: by the point they work out the place to sit down, every part has moved—and solely defenders know which chairs are actual and which have turn out to be traps.
The know-how transforms present deception instruments from passive traps into energetic ones. When Frenetik rotates actual sources, attackers following stale intelligence get funneled straight into honeypots and decoys, supercharging interplay charges with basic deception components that beforehand solely hoped to look actual. In contrast to options requiring intensive tuning or analyst oversight, Frenetik works as a result of attackers merely lack the knowledge wanted to know the distinction.
“I need the adversary to must repeatedly put a devoted physique onto each goal they go after – no extra free lunches or simple days for America’s adversaries,” says Ismirnioglou.
About Frenetik
Frenetik, a Maryland-based cybersecurity startup, simply emerged from stealth with a brand new method: as an alternative of flooding defenders with extra knowledge, it starves attackers of the knowledge they should transfer. Centered on measurable safety outcomes, and pricing transparency, Frenetik is constructed to tip the stability of energy by denying adversaries reliable perception into focused environments. Frenetik provides a free group model at www.frenetik.us.
Contact
Founder
Hans Ismirnioglou
Frenetik
data@frenetik.us








