It should be Simple

A MuMu router will simply do what others claim, but in a novel way. As it protects your connection it protects what comes into your computer. Millions are spent to recognise any virus or vulnerability that roams the internet, but in the end do we really care about that? We decided that the only thing relevant in the end is to not get sick rather than knowing what you have been infected with.

While taking a close look at how anti-virus companies function in removing viruses from computers, we at MuMu systems didn't think that allowing any hack or infection that way made any sense. Why would you allow to be infected or hacked and then try to fix the problem? We thought it made more sense to put on the bulletproof vest before we get shot. Or as another example: when a gun is detected at the airport, you would want to take it away immediately instead of trying to find out what type of gun it was. Therefore, the MuMu router was developed.

Network level is where the magic happens

If you protect the network, you can prevent any infection or hack from ever taking place. Our method is both elegant and effective; where others are trying to recognise the actual payload that someone is sending, we prevent it from being spread. A MuMu router changes the playing field, by recognising the methods commonly used to infect computers. This sounds simple, doesn't it. Regrettably it's not! But luckily for us hacking software has many telltales; all we had to do is find the logic behind that.


It took us 5 years to get it right, but what we developed is a system that recognises the way computers can be infected and acts upon those specific and very recognisable markers. Most viruses and hacks nowadays can be developed in hours and even minutes sometimes. Our claim is that our router will catch a virus or hack, the same second it was conceived, by using our uniquely patented software. We classify what it is and then take the sending party out of the equation. This can be done both temporarily as permanently in order to protect the network and the computers that are using it.