Cloudbric | Secure Your Blockchain Experience

Cloudbric is a decentralized universal security platform featuring enterprise-grade website, mobile device and crypto asset security, as well as access to a community driven threat intelligence database all powered through a new technology called VISION (patent pending), a CNN-based deep learning AI-tech, featuring one of the most accurate (low false positive rated) engines on the market. Our goal is to not only secure the web in general, but to secure the entire blockchain experience for users and businesses alike whether it’s protecting global exchanges, securing cryptocurrency assets, etc. so that we can help further encourages the widespread adoption of this great technology to masses. Cloudbric is currently a market leading web application firewall as a service vendor in South Korea and Singapore. We boast multiple awards (SC Magazine, Stevie Awards, Info Security PG, more), are industry-certified, and have more than 10,000 customers and partners.
Current Cybersecurity Reality
As the world shifts to a more interconnected and internet driven society, the need to secure private online data is becoming increasingly paramount. The open flow of information between various online channels makes both users and organizations highly vulnerable to cyber hacking. Critical online data breaches are now reaching record highs with millions of personal records being stolen each and every year.
Cyber attacks are also expanding their reach into new and emerging markets, such as cryptocurrency assets and exchanges. In the past year alone, multiple cryptocurrency funds, worth over hundreds of millions, were hijacked by online criminals. This makes protection for digital assets found within the cryptocurrency market a new top priority for all users.
In order to counteract the growing cybersecurity concern, users must take action by safeguarding private data flowing across all communications protocols (i.e. email, websites, mobile devices, cryptocurrency exchanges, etc.). However, the implementation and management of multiple security solutions can be an extremely difficult task due to fundamental issues present in the market, which ultimately inhibits users from fully embracing the widespread adoption of cybersecurity.
Oversaturation of Security Solutions
The need to secure data across numerous online channels has led to the oversaturation of solutions made available to users. Currently, there are more than 1,600 solutions offered in the cybersecurity market worldwide, which makes the selection process for each security solution overly complicated. Users are usually left to their own devices to properly test, judge, and select from a sea of providers that offer similar solutions. Also, the management of these diverse solutions can be quite burdensome as users are forced to adapt to drastically different security platforms, software, settings configurations, pricing, etc.
The idea of taking a layered approach to cybersecurity, as outlined above, is simply inefficient and outdated. Studies show that some organizations use up to 70 different vendor made security solutions in order to solve a host of information security related issues. Deploying more security solutions does not necessarily lead to higher security. In fact, utilizing an excess of solutions could leave users even more susceptible to hackers as users must be cognizant of system upgrades and security bugs found in each respective software.
For many users, cybersecurity is a very foreign and complicated subject. This leads to vendors taking advantage of users’ lack of knowledge by flooding the market with an overabundance of security solutions. Security providers should no longer look to profit off user naivety and instead should focus on building consolidated solutions that allows users to truly feel secure online.
Centralized Threat Intelligence Data
Another issue present in the information security market is the lack of transparency over threat intelligence data. By providing servicing to end users, cybersecurity vendors are able to collect vast amounts of emerging cyber threat information, such as attack patterns and behaviors, malicious IP addresses, identification of malware infected files, etc. However, threat intelligence data compiled through security servicing is not made accessible for public use.
Vendors typically privatize this information and use it for their own personal gain. For instance, cyber threat data is used to help develop new market solutions, issue pertinent software updates, create industry reports and analytics, etc., all of which can be valuable sources of revenue. On the other hand, users who help generate this data for vendors are left with little to no compensation and are forced to continue paying for vendor made services. This uneven centralization of threat data and lack of compensation must come to an end.
Rather than profiting from the security community, cybersecurity vendors must become active leaders on behalf of the community by making security intelligence open and accessible to all. Also, users should be encouraged and incentivized to secure their digital assets to promote a more trusted online society.
Uncertainty of Security Performance
Lastly, the current organization of the cybersecurity market makes it very difficult to discern the effectiveness of various vendor made solutions. As mentioned above, the market is highly saturated with an excess of information security vendors and solutions. The only way for users to properly distinguish vendor performance is through direct testing of these solutions. However, this can be an extremely resource intensive and costly ordeal.
Users typically need to invest both time and money in order to learn about a particular security solution, measure its respective performance, then decide whether it will be easy to manage and deploy. However, general end users and small businesses may not have the necessary resources and capabilities to test multiple security solutions all at once. This leaves enterprise organizations as the only target audience that can enjoy access to the full spectrum of security that every user needs.
Additionally, cybersecurity vendors tend to excessively promote their security capabilities, but many lack industry experience or high performance working products to become a trusted security vendor. This is especially true within the ICO arena where many fraudulent companies and vendors with limited security expertise run rampant.
Proposed Solution
Cloudbric’s primary mission is to revolutionize the cybersecurity market by making information security open and accessible to all users through the introduction of a new Decentralized Universal Security Platform. This AI-based cybersecurity platform will be powered by Cloudbric’s patented deep learning module known as VISION and will provide an all-inclusive suite of cybersecurity solutions, as well as the development of a new decentralized security ecosystem.

Furthermore, users will be able to train the very technology that helps protect their online digital assets by contributing anonymous cyber threat logs to advance the accuracy and learning capabilities of Cloudbric’s deep learning module. For their continued security contributions, users will be rewarded through the free distribution of Cloudbric cryptocurrency (CLB) tokens directly to their user account.
CLB can then be redeemed to activate Cloudbric’s suite of security services. A minimum balance of CLB tokens must be deposited or accumulated within each user account wallet in order to utilize all security services. Additionally, users may utilize CLB to gain access to exclusive offers from Cloudbric’s extensive global partnership network known as the Secure Web Alliance.
Reverse ICO Formation
Cloudbric’s motivation to launch a reverse ICO is to empower all users to become the primary drivers of decentralized cybersecurity advancement and to become one of the first vendors to provide a suite of cybersecurity solutions powered by AI-based deep learning technology.

The cybersecurity market as a whole is expected to become a $165 billion dollar industry by 2023 with the fastest security adoption rates stemming from the APAC region. Due to Cloudbric’s experience and eminence within the APAC security market, Cloudbric will be in a strong position to become a sustained market influencer with the expansion of its decentralized universal security platform.
Furthermore, Cloudbric will look to disrupt the security market by integrating deep learning technology into its core security technology to become the most technologically advanced security vendor in the arena. This will also enable Cloudbric to take advantage of one of the fastest growing technology markets today — the artificial intelligence sector. According to global forecasts, the AI market is expected to reach a size of $191 billion dollars by 2025.
Why Cloudbric?
Cloudbric has focused large amounts of resources and shared in a wealth of information over the past two decades. Mentioned briefly in “What is Cloudbric (CLB)? A Beginners Guide”. Penta Security Systems Inc. was founded in 1997 by Cloudbric Advisor Seokwoo Lee , and while the company quickly rose as a market-leading provider of web and data security products, solutions, and services in the APAC region. Mr. Lee took it even farther by always putting technology first. While a private company, Penta Security Systems has been involved in various projects that do not necessarily generate instant profits. Mr. Lee emphasized that this is not accidental. In stating “We have undergone trial and error, but the know-how we’ve learned has enabled us to make better products.” He continued, “Our bold investment in technology and passion for R&D have served as the foundation for Penta Security.” This is clearly reflected in the lifelong customers it’s created with this security first business model. The proportion of R&D personnel at Penta Security is regarded as very high, when compared to other Korean IT security companies. Excluding those who work in technical support and consulting, the number of those who research and develop new products exceeds 50 percent, an extremely challenging task for most IT security companies.
Token Offering Info
Token Type: ERC-20
Public Sale Cap: 10,000 ETH
1 ETH = 12,500 CLB | 1 CLB = 0.00008 ETH
Tokens can be bought only with ETH
Presale & Main Sale requires KYC
Airdrop and Bounty does not require KYC
Presale bonus tokens subject to 3 month lockup
Restricted countries: China, USA
CLB Token Distribution Plan
Max Supply: 1,000,000,000 CLB (1 billion CLB) minted
44% will be allocated for the token sales events
25% will be allocated for the Cloudbric Security Rewards Program & Operational Costs
16% will be allocated for the core Cloudbric team and advisors
10% will be allocated as an investment reserve (i.e. potential exchange listing, strategic partnerships, etc.)
5% will be allocated for marketing efforts to help promote CLB tokens. 1–2% reserved for airdrop and bounty program.
Unsold Tokens
All unsold CLB tokens will be burned.

For more information :
Website : https://www.cloudbric.io/
Whitepaper : https://ico.cloudbric.io/upload/file/Cloudbric_Whitepaper_EN.pdf
Onepager : https://ico.cloudbric.io/upload/file/Cloudbric_One_pager_EN.pdf
Twitter : https://twitter.com/cloudbric
Telegram : https://t.me/cloudbric
Facebook : https://www.facebook.com/cloudbric/
My Profil : https://bitcointalk.org/index.php?action=profile;u=1687366;sa=summary
