top of page


This nano agent detects and blocks malware on IoT devices. This is possible because it has a radically small memory footprint - under 10MB - and minimal computational overhead. Simbiota runs as a background process and finds 98% of known malware, therefore it immunizes your IoT platform against potential threats.

Raspberry malware protection is now available for everyone with Simbiota. Our mission is to make it available on all IoT and OT platforms. 




Simbiota uses so little memory and CPU that it doesn't interfere with the normal operation of your device. The size of database updates is also small, making bandwidth consumption minimal.

98% true positive

It provides considerable detection capability. It detects every sample that has been seen by the antivirus company and beyond.

no false positives

In our experiments, we did not experience any false positives yet, so it will not quarantine files that are necessary for operation. However, you can still set exception folders that are not checked.

scientific research

This product is based on several years of research, the results of which, together with metrics and data, are available here >>

similarity-based detection

Simbiota can detect previously unseen samples that happen to be similar to a known sample.


Malware is checked every time you access a file for reading and execution. 

no cloud comm

Your privacy is guaranteed, because all detection is done locally, there is no cloud communication (except for the database updates).


You have the opportunity to check what you install on your device.

commercial license available

Contact us for more information if you need other license terms than GPLv2.


Configure, adapt, change Simbiota to your needs. 

no need to change your OS

Simbiota runs as a normal process, you do not need to recomplie your kernel.

runtime detection

No restart recquired to immunize your IoT platform.

Test the next revolution of IIoT security on your berry

no matter how small, embedded devices are still

computers with exploitable vulnerabilities

detect malware

detect malicious attempts

quarantine malware

pushing security fixes

detect insecure points of your network

Check out our blog

bottom of page