Translate the page
Feel free to ask any questions, leave your comments, wishes and suggestions regarding the Google Translation at our Telegram Chat.
Like this video

BitFence

Remove Hackers From Your Network

Problem: 100% of companies in the world are getting attacked by the hackers and the average detection time is 256 days (2015 Ponemon Report) leading to enormous economic and privacy damages. Similar attacks repeated against multiple targets before they are detected, understood and mitigated. Solution: BitFence Detects, deflects, and counteracts attempts at unauthorized use of information systems and gives your security team an unfair advantage over hackers. HNY Token: Community members "mine" hackers by running honeynet nodes are rewarded with HNY tokens. We correlate information together and provide 0-day threat feeds to customers who can purchase subscription with HNY tokens. Patent pending.

4.1
3 2 expert ratings
Benchy 3.7
Experts
5.0
5.0
5.0
View rating distribution
Ended
Token
HNY
Price in ICO
0.1123 USD
Country
USA
Whitelist/KYC
None
Restricted areas
None
preICO start
1st Apr 2018
preICO end
1st May 2018
ICO start
1st May 2018
ICO end
31st Oct 2018
More on ICO
Report

About BitFence

Mission of BitFence Cyber Solution is to reduce the average detection time of zero-day malware as well as adopt and deploy a proactive defensive approach/solution to mitigate other systems from similar cyber threats.

BitFence offers its users with tools required to scale the growth of cyber threat and protects networks proactively, before any harm would have occurred to the network and related assets.

BitFence ecosystem consists of following three main parts:

  1. Installation of BitFence designed Distributed Sensor Network (also known as Distributed HoneyPot). BitFence offers the incentives to anyone who runs BitFence designed software and/or hardware “miner”. These miners will automatically detect and reports suspicious cyber related activities. The miners will get rewards through distribution of BitFence ‘HNY’ Tokens.
  2. Malicious and suspicious data being gathered by miners will automatically be analyzed, processed and ranked (in accordance with risk factor) by artificial intelligence algorithm in real time. The list of signatures therefore be updated accordingly.
  3. Finally, once the data is processed and malicious actors (hackers) are identified, the information is instantaneously fed to all BitFence subscriber in order to mitigate them with similar threat.
Bookmark
ICO KYC Report
Not conducted yet
KYC procedure verifies selected/specific team members only. It does not guarantee ICO success nor is a call for investment.
Missing or incorrect data? Let us know.

ICOs that might interest you

4.2

Infleum

INFLEUM is an open source brand publishing and marketing agent platform based on blockc...

15 days 18 hours left
4.0

CrowdForce

CrowdForce uses mobile technology and a network of field agents to help businesses, ban...

14 days 13 hours left
4.3

BetInReal

BetinReal is the first AR/VR gambling solution in the world, based on blockchain techno...

45 days 13 hours left
4.6

Lynked.World

Lynked.World is a blockchain based ecosystem and development platform which provides a ...

64 days 13 hours left
Join our Official ICObench group on TelegramOfficial ICObench Telegram group

Cookies help us deliver our services. By using our services, you agree to our use of cookies.

Learn more Got it