There are around 150,000 known vulnerabilities when you access your wifi
400% increase in cybersecurity attacks against businesses since March 2020
Attacks on #healthcare providers have turned into a $13.2 billion industry in the US
239.4 million attempted attacks targeting healthcare alone in 2020
There are around 150,000 known vulnerabilities when you access your wifi
400% increase in cybersecurity attacks against businesses since March 2020
Attacks on #healthcare providers have turned into a $13.2 billion industry in the US
239.4 million attempted attacks targeting healthcare alone in 2020
Select Page


guardDog Protective Cloud Services (PCS)

Our cyber security solution is designed to offer the simplest and most cost-effective answer to the growing vulnerabilities around the use of inherently vulnerable devices on networks that lack visibility or protective measures in what we call, ‘edge territory.’

We refer to edge territory as the space between “known” or “understood” networks usually under the management and protection of cybersecurity professionals. Only through combined visibility at a device and network-level can effective protective measures be taken. As the enterprise becomes more distributed, a trend accelerated by remote working, traditional methods of extending trust beyond the enterprise network are proving inadequate.

Deploying expensive security technology and cybersecurity experts on staff is not practical to extend to remote networks. Simpler and more cost-effective solutions are needed.


Our Fido network security device is deployed as an overlay to existing networks designed to monitor wireless and wired networks and the devices that are attached to them. Our solution is a combination of security device installed on edge territory networks, and our AI-powered cloud software services. Installation is easy, and service can be activated in minutes on any network and immediately begins identifying all attached devices on the network and the network itself. The network is scanned at regular intervals for new devices or changes to the network to ensure it maintains the latest information regarding network citizens.

Device and network information are matched with publicly known and unknown information regarding exploits of all connected devices. This provides new levels of visibility with little to no expertise required to perform risk assessment of the edge territory networks.

Using a simple color-coded system to score the threat risk associated with any detected incidents provides an easier way to determine what threats to focus on. A simple glance can show you whether the network or devices are green, yellow, orange or red.

Red, the highest threat level, indicates that there is an attempted exploit taking place at that moment. Orange indicates the known exploit can cause known damage to the devices, networks, and information contained on them. Yellow has increased risk based on being known to be exploited but is not critical. Lastly, Green indicated devices to be as safe as possible with the information available.

Click to enlarge


As a real-time network overlay, our service watches and guards Wi-Fi networks with AI-powered automated countermeasures to help shut down attempted exploits of device and network vulnerabilities with automated countermeasures, for example:

  • Denial of Service – seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests to overload systems and prevent some or all legitimate requests from being fulfilled.
  • Spoofing – a person or program successfully identifies as another by falsifying data to gain an illegitimate advantage. Many of the protocols in the TCP/IP suite do not provide mechanisms for authenticating the source or destination of a message, and they are thus vulnerable to spoofing attacks when extra precautions are not taken by applications to verify the identity of the sending or receiving host.
  • Man in the Middle – the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other. One example of a man in the middle attack is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within the reception range of an unencrypted Wi-Fi access point could insert themselves as a man-in-the-middle.

While not limited to these families or specific attacks, our solution utilizes its patent-pending approach to redirect potential exploits or attacks to places where they cannot do their intended harm. Our service maintains an extensive collection of automated countermeasures that minimize impact to the network or devices being protected while offering simple and clear protections on the wireless spectrum.

When combined with Theta or Omega customer support solutions, a certified security technician can offer additional help in helping you to resolve found threats or vulnerabilities on your network and devices. This provides unparalleled simplicity and cost-effective protection “per edge territory” that to date has not been available for networks. Now, anyone can easily start network protection to expose and shut down cybersecurity threats.


  • Cloud-based artificial intelligence works to keep current on the latest threats 
  • Automatically eliminates Wi-Fi network attacks such as denial of service and others 
  • Color codes threats and offers detailed forensic details 
  • Tracks all attack incidents and vulnerability analysis in detailed logs 
  • Exposes possible device and network vulnerabilities on wired and wireless networks 
  • Offers enterprise management features for working in distributed environments 

guardDog FiDo

The guardDog FiDo security device is engineered to be the on-site guardian of your network and devices, coordinating with our cloud software service to stay up to date on the latest threats. 

It connects to your router via a wired Ethernet connection and beginning protection the moment the power light comes on.   

The combination of our network security device combined with cloud software service introduces a hybrid cloud architecture that utilizes the cooperative power of security device and countermeasure services to offer everything needed to protect network environments. In today’s changing world, offers a unique solution to improving security between the traditional enterprise and remote 3rd party networks.


  • Deploy on any network in minutes without security expertise
  • Gain visibility into all devices connected with your network
  • Automatic updates to keep up with emerging threats

How To…

Setup Guides

Click to enlarge

Frequently Asked Questions

Please click on the question to open and close to view the answers to each question on the right hand side.

What is "Edge Territory"?

Edge Territory is the invisible space between networks. For example connecting to a hotel or cafe Wi-Fi network or working from home while doing work could create vulnerabilities around sensitive or private data. Any device on a network can also leave openings, such as a web cam, a digital doorbell, etc. guardDog creates visibility in this space, and has an AI-powered cloud solution that keeps your guardDog device up to date on the latest threats. So, you can now see the invisible and do something to stop it.

What can guardDog show me?

guardDog can show you all devices on your network and will report suspicious activity using an array of color coded threat levels. All of these can be seen and managed through your guardDog cloud dashboard.

How does guardDog work?

guardDog acts as a proxy between networks, to ensure only those authorized operate on your edge territory network. guardDog gets regular updates from our AI-powered cloud service which monitors and reports on threats. 

When will guardDog be available?

guardDog is available now, sign up click here 

How much does it cost?

We have not yet announced this, but our initial product will be monthly cloud service and device fee. Annual purchases will provide discounts.

Are you working with large enterprise companies?

Yes, we have been perfecting our approach with enterprise customers across industry verticals. guardDog is the perfect remote worker management platform and we are happy to tell you more. Click on Get in Touch for Enterprise Plan and someone on our team will get back with you.