Cydalics CYDALICS

Hidden risks in
networks, signals & AI —
finally visible.

Visibility, evidence, and control for the radio signals, connected devices, automated workflows, and AI systems modern operations now run on.

Request a Demo Talk to us

A former CISO and a security-industry veteran — 50+ years across both sides of the security industry.

Sovereign by design On-premise · Offline-capable AI-driven evidence

What we do

Where the new risk hides.

Cydalics helps organisations see and control risks that sit outside the reach of traditional IT and cybersecurity tools — in complex communications, radio signals, satellite signals, connected devices, and AI-powered agentic workflows.

Blind spot

Wireless & radio signals

Detect, locate, and document rogue devices, drones, jamming, spoofed GPS, and unauthorised cellular activity on your sites.

Blind spot

Complex IP communication

Deep analysis across thousands of applications and protocols — insecure communications, hidden channels, attacker behaviour, and configuration drift that rules-based tools miss.

Blind spot

AI-powered workloads

Monitor agent behaviour, data movement, and decision-making for misuse, prompt injection, and drift.

Blind spot

Connected operations

Map the dependencies between systems, devices, and suppliers — and surface the weak points before they're exploited.

Blind spot

Cyber-risk evidence

Defensible findings and reports that boards, auditors, insurers, and regulators can actually rely on.

Blind spot

On-demand & continuous monitoring

Continuous or on-demand visibility, alerting, prioritisation, and escalation — so risks surface the moment they appear.

The Cy-Mind platform

Three products. Complete coverage.

Purpose-built for the layers traditional cyber tools don't cover — the signal layer, the network communication layer, and the AI agent layer.

Radio Frequency

Cy-Mind RF

Silent, AI-driven wireless threat detection. Drones, GPS jamming, rogue transmitters, hidden cellular modems — plus GPS-free positioning to within three metres.

Drone & rogue transmitter detection
GPS jamming & spoofing alerts
Passive direction finding & tracking
GPS-free positioning
Learn more →
Internet Protocol

Cy-Mind IP

AI-driven communication intelligence across 500+ protocols and 2,000+ applications. Exposes shadow IT, insecure transfers, suspicious DNS, and hidden third-party paths.

500+ protocols & 2,000+ applications
Shadow IT & hidden third-party paths
Suspicious DNS & encrypted-traffic anomalies
AI-guided, defensible findings
Learn more →
Agentic AI Governance

Cy-Mind AI

Identity, communication oversight, approval gates, behaviour detection, and tamper-resistant audit for every AI agent running in your business — SaaS or sovereign.

Identity & scoped access per agent
Approval gates & policy controls
Prompt-injection & drift detection
ISO 42001 / NIST AI RMF evidence
Learn more →

Services

Eight services. Three decisions.

Independent assessments, incident support, and recovery verification — with evidence your auditors, insurers, and boards can rely on.

Family 01

Incident & Recovery Verification

Investigate disruption. Verify recovery. Prove what remains.

Cy-IncidentSight · Cy-RecoveryCheck →

Family 02

Operations Risk & Evidence

Before the audit, the insurance renewal, the board paper, or the deal — defensible evidence on demand.

RiskScape · CyberCheck · CyberSight · CyberSure →

Family 03

Wireless & Signal Resilience

See what's broadcasting, who's listening, and where your signals reach — including GPS-style satellite navigation.

Cy-Wireless · Cy-SpectrumSure →

Findings map to the standards your auditors care about

IEC 62443 NIS2 DORA NCA ECC SAMA CSF UAE NESA APRA CPS 234 Essential Eight ISO 27001 ISO/IEC 42001

Anchors we map to — not certifications we hold.

In production

Cy-Mind IP runs at a large Australian insurance group.

Deployed alongside their existing best-of-breed stack — next-generation firewalls, endpoint detection, SIEM — where it surfaced an entire layer of network activity that those tools were not designed to see.

Sovereign by design

Your data, your agents, your evidence — all stay with you.

Cydalics supports on-premises, fully offline, and customer-controlled deployments — so your data, models, agents, and operational context never have to leave your control. Built for regulated industries, sovereign environments, and sensitive sites.

Cydalics is shaped by the rigorous security, compliance, and regulatory regimes of Australia and Switzerland — both amongst the world's most demanding jurisdictions — and brings that discipline to engagements in-region.

On-Premise
Offline / Air-Gapped
Customer-Controlled
In-Country

Start with a focused assessment.

Quick to run, low effort on your side. Surfaces where hidden risks sit, what their business impact would be, and where current safeguards may need strengthening.

Request a Demo Talk to us