The cyberstorm is coming.
Get the power of Zerho Endpoint and Network Detection and Response on your side.


It’s a Cat-5 cyberstorm about to unleash on your business - and never let up. True protection requires an advanced security solution that will outsmart the clever threats of tomorrow. Get the world's first cybersecurity solution to do both Endpoint Detection and Response (EDR) and Network Detection and Response (NDR). Or risk everything you’ve ever worked for.

At Zerho, better is at our core:

Better remediations.
Better at predicting and detecting threats.
Better machine learning for taming unfathomable security challenges.
Better at integrating human wisdom with tech and scalability.
Better at oversight for management.
Better at security solutions.

Zerho components deploy innovative advances to deliver a significantly superior comprehensive solution.

Products

    Core Products

  • Prodigy Endpoint

    Zerho Endpoint is an Endpoint Detection and Response (EDR) software agent that continously monitors and responds to extraordinary and ordinary threats alike. Endpoint will enhance your security posture by providing the deep visibility necessary to detect extraordinary threats, stopping ordinary threats from executing in the first place, and forming the infrastructure to respond effectively. Get an extraordinary EDR solution.

     

    Endpoint continously collects high-resolution measurements of device activities. These measurements are sent from many endpoints to a centralized analytics system to detect extraordinary threats and provide security analysts with the infrastructure to swiftly respond. In parallel, these measurements are also processed with local analytics to stop more ordinary threats from executing. Endpoint is extremely resilient and can operate successfully even on already compromised devices and networks.

     

    Supported platforms:

    • Windows
    • Mac OSx
    • Linux
    • iOS
    • Android
    Learn more...
  • Prodigy Analytics

    Zerho's flagship software, Prodigy, is a predictive and prescriptive cybersecurity analytics system. Prodigy is your force multiplier, making sense of immense quantities of complex data from your endpoints and network to deliver better actionable intelligence and remediation options.

     

    Machine Learning

    Machine learning is generally triple constrained between: training speed, action speed, and accuracy (comprising both precision and recall). Prodigy leverages Zerho’s expertise with special technologies and deep understanding of machine learning to simultaneously excel in all three areas. Prodigy is fast to learn, fast to act, and highly accurate.

     

    We know that most cybersecurity vendors are not using real machine learning. At worst, first-order math such as moving averages and standard deviation is marketed as advanced machine learning. At best, a few vendors use real but sub-optimal machine learning algorithms. The best way to verify Zerho's superior machine learning is to contact us to setup a side-by-side demo and judge for yourself.

     

    Architecture

    Prodigy has an innovative force multiplier architecture that more comprehensively addresses cybersecurity. In addition to superior predictive analytics, Prodigy delivers customized prescriptive remediation options. Our system uses a sophisticated feedback loop architecture along with machine learning technology to automatically devise the best remediation options. The system continually monitors the efficacy of the remediations and adapts. This frees up operator time spent on critically important but tedious work, and instead lets them focus on the most vital remediations. The result is a force multiplier effect where productivity skyrockets and a small platoon of operators has the efficacy of a large cyber brigade. No one will be able to hire enough SOC operators alone to effectively handle the coming cyberstorm - this force multiplier technology is your key to survival.

    Learn more...
  • Prodigy Network
    Electric Eye is a network detection and response (NDR) system that performs granular capture and retention of network data together with signature and machine learning-based traffic analytics.

    Zerho’s unique software-only approach combines line-rate physical collection of network traffic with unmatched filtering sophistication to efficiently channel relevant information to the tools and decision makers that need it. Since relevance changes over time, Electric Eye includes deep-archive network forensics capabilities typically restricted by cost and complexity to only the largest enterprises. Electric Eye delivers relevant real-time data now and relevant historical data when you realize you need it.

    Network Packet Broker (NPB)
    Zerho’s high-performance software performs line-rate physical collection of network traffic from the fastest 100Gbps ports down to the slowest legacy connections. Data can be collected safely from out-of-band passive network TAPs and active network mirroring, or in-line with direct connections. The real-time packet processing engine offers superior filtering capabilities to maximize the efficiency of data it channels to performance, network management, analysis, compliance and security tools. Increase your insight and cut your costs by using Electric Eye to send more needles and less hay to your tools.

    Network Forensics (NF)
    Companies take nearly six months on average to detect cyber attacks. When you learn that your organization was breached months ago, but you only retain a few day’s worth of evidence, what will you do? With Electric Eye’s cost-effective full-packet capture, you know that you are covered.

    Electric Eye puts high-grade network forensics within reach. Using the same sophisticated filtering capabilities as for NPB, Electric Eye can slice packets and archive relevant data for forensics. Full packet capture, header-only capture, complex custom packet filtering and slicing – no problem – Electric Eye was built to handle this. Electric Eye’s vendor agnostic storage architecture maximizes your cost per GB to make long-term forensic archive attainable. Store encrypted forensic data on-premises for full physical control, or in the cloud using physical media transportation to achieve cost savings and operational simplification. When you learn that your organization was breached, you can immediately follow the full network forensics trail to see exactly what happened - even in the likely event it occurred months ago.

    Key Electric Eye features include:

    • Sophisticated filtering of physical through application layer data
    • Unique software-only approach designed to work with both commercial-off-the-shelf on-premesis hardware and cloud infrastructure
    • Linear scalability to thousands of petabytes per second
    • Packet slicing: Full 100% packet capture, header-only capture, or a custom capture mix of full packet, partial-packet slices, header-only, and disregarded traffic as desired
    • Forensic network traffic data archive
    • Consumption pricing model – significant cost savings compared to competing solutions
    • SSL/TLS data decryption in-band and out-of-band
    • Lawful Intercept
    Learn more...
  • Supporting Products

  • IMINT
    IMINT is an imagery intelligence system that connects the physical world with the digital realm. The system analyzes imagery data, such as security camera video feeds, to provide additional sources of useful intelligence.
  • Tox-rs

    Tox-rs is a maximum-security communication system implemented by Zerho. Tox is easy to use software that connects you from point A to B without anyone else listening in. Tox is made by the people who use it — people tired of the existing options that spy on us, track us, censor us, and impede innovation. There are no corporate interests, and no hidden agendas. Just simple and secure communication that is easy to use. Tox is completely free and comes without advertising — forever.

    Use Tox today to restore your security for instant messaging, voice, video, screen sharing, file sharing, and more.

    Encrypted

    Everything you do with Tox is encrypted using cutting-edge open-source libraries. The only people who can see your conversations are the people you're communicating with.

    Distributed

    Tox has no central servers that can be raided, shut down, or forced to turn over data - the network is made up of its users. This is achieved by using DHT and direct (P2P) connections between the peers in the network. Say goodbye to server outages!

    Free

    Tox is free and open-source software. That's free as in freedom, as well as in price. This means Tox is yours - to use, modify, and share - because Tox is developed by and for the users.

    Learn more...
  • ZerhOS

    ZerhOS is a high-performance, security-focused Linux distribution. Running a high-security OS will keep you safer by reducing your attack surface.

     

    Don’t run your applications on a foundation of sand – use ZerhOS as your bedrock.

     

    ZerhOS can be used by itself as an operating system for any purpose desired, and is the foundation on which all Zerho products run. ZerhOS security benefits include the availability of upstream updates and patches days or weeks sooner than other operating systems, more secure yet easier to use login, true full disk encryption (FDE) including parts rarely encrypted by other operating systems that claim to offer FDE, emergency self-destruction to prevent sensitive data from falling into the wrong hands, and intuitive user interface options to make these advanced features simple to use.

     

    These benefits are achieved through:

    • Upstream zero-day rolling-update capability.
    • Smart card PKCS#11 cryptographic authentication and decryption.
    • Fully encrypted boot partition plus fully encrypted regular partitions.
    • Emergency self-destruction:
      • Under-duress secure-wipe.
      • Dead-man switch secure-wipe.
    • Intuitive graphical user interface for installation and maintenance.

     

    Learn more...

Price calculator

Ahead of the competition on quality as well as cost - see for yourself with our price calculator

(contact us for pricing)

Zerho Software License

Port speed 1 Gbps 10 Gbps 25 Gbps 40 Gbps 50 Gbps 100 Gbps
Link quantity
Average utilization, %
Monthly Traffic            
Price per Tbit $0.20
Subtotal 0 0 0 0 0 0
Total $0.00 per month

Zerho Software License

Link quantity Average utilization, % Monthly Traffic
1 Gbps
 
Subtotal: 0
10 Gbps
 
Subtotal: 0
25 Gbps
 
Subtotal: 0
40 Gbps
 
Subtotal: 0
50 Gbps
 
Subtotal: 0
100 Gbps
 
Subtotal: 0
Total $0.00 per month

Storage Sizing

Total traffic
Recording Mode
Header only
Full Header only Hybrid mode
Hybrid Allocation
Blue is full-capture; Green is header-only; Red is disregarded packets.
Header size
Average Packet Size
Days of Retention
Storage Required
Cloud Storage Archive
Storage Type
AWS Glacier $0.004 /GB/month
AWS Glacier $0.004 /GB/month AWS S3 One Zone-IA $0.01 /GB/month AWS GovCloud Glacier $0.006 /GB/month AWS GovCloud S3 One Zone-IA $0.016 /GB/month
First 1 days cloud costs
payable directly to Amazon
Monthly Cloud Costs thereafter
payable directly to Amazon

Pay what you want:

Learn more

Complete the form below and we’ll get right back to discuss your business needs. We don’t hesitate because realize timing is imperative. For customer service related questions or product support, visit Customer Support  We’re quick to get back there too.

Zerho is a team of industry veterans who joined forces when we discovered that most security products and services were not nearly as effective as claimed. We know there is a better way. Our mission is to solve the future challenges of the coming cyberstorm. Our products utilize innovative machine learning and a force-multiplier architecture that joins the best of the human mind with advanced technology to predicatively prevent attacks and prescriptively remediate incidents. Our expertise with special technologies and deep understanding of machine learning enabled us to design a system that simultaneously excels in all three key areas of ML: training speed, action speed, and accuracy (comprising both precision and recall). Our force-multiplier architecture effortlessly leverages your best people to make the entire team orders of magnitude more effective and productive at handling cybersecurity.

Company

Careers

Junior Front-end developer


Key Qualifications

5+ years of experience of developing and maintaining infrastructure in a high volume of customer-facing environment. Strong core Java and Java EE programming skills.
Strong object oriented programming and design skills.
Experience with Java web frameworks such as Spring MVC.
Experience writing Java libraries and developing REST APIs (i.e. writing code/services meant to be used by others).
Experience with writing hand-crafted SQL, PL/SQL.
Familiarity with Tomcat, Weblogic, JBoss, Jetty etc.
Excellent problem solving skills.
Phenomenal Debugging skills.
Strong communication skills and ability to work effectively across multiple business and technical teams.
Demonstrated ability to deliver results on time with high quality.
Aptitude to independently learn new technologies.


Description

We are looking to hire outstanding individuals to join our team of Foundation Services to build and run the platform that delivers Apple’s services to all of its customers around the world. Help us build the Apple experience on a global scale. Additional key skills: Experience with SOLR or ElasticSearch Experience with Spring-Boot/Dropwizard Knowledge of HTML5, CSS3, JavaScript and Angular JS Knowledge of scripting languages (e.g. ruby, python, Perl, bash, etc.) Responsibilities will include: Measurement and optimization of system performance Build automation frameworks/scripts Deployment, support and monitoring of new platforms and application stacks. Participate in new technology evaluation, design and development of highly scalable distributed databases Explore and evaluate new technologies and solutions to push our capabilities forward, getting ahead of our customers’ needs, getting people incentivized to transform, innovate and continually improve


Education

BS in Computer Science or equivalent experience

Senior Front-end developer


opppp

My test job2


my test job2

admin_supp


admin_supp

Business_Operations


Business Operations

Customer_Support


Customer Support

Marketing


Marketing

intern admin supp


intern admin supp

intern Business_Operations


intern Business Operations

intern Customer_Support


intern  Customer Support

intern marceting


intern marceting

intern sales ingener


intern sales ingener

Sorry, there are no results matching your criteria.

Contact Us

Zerho LLC
1001 19th St N, FL12
Arlington, VA 22209

Make an appointment

202-599-9500

Support Login