
Our all-platforms threat detection technology stands out in its holistic approach. It is based on three strategic tools: Education, Network community, and Monitoring and Guidance.
Education for responsible behavior
We believe that Compelling force, Invading interference and Limitations stands in contrast to the freedom and opportunities that the internet invites. Instead, we trust the community of our users and offer educational guidance. We achieve this by a friendly character that pops up whenever a possible breach occurs and guides the user to a safe port.

Leveraging the power of the social network
Getting by with a little help from our friends is also true for the internet. Just like in the real world, we expect our network friends to warn us about a potential threat. They may do that by grading the content they are exposed to. By doing so they enables the interception of the potential threats prior to its action.
Of course, content and user grading is also done seamlessly by our top notch technology whenever it detects mal-content either in text, video or voice deciphering.
Applying ad hoc monitoring and guidance
Although we would rather refrain from intervention in the user's experience, in some cases it is a necessary evil. We offer the user, and its adult guardian, to choose whether they want to restrict some actions and whether these action shall require the guardian's approval.
The guardian may also receive notification at real time in the case of a realization of a severe threat.