Threat Detection SystemIntelligence driven threat detection for your network

Identify malicious activities in your internal network to prevent intrusions, attacks, data leaks, and espionage

Immediate notifications on all relevant malware families
Identification of infected devices in your company’s wireless networks
Manual log analysis and allocation of critical incidents by Group-IB experts
User-friendly web interface and detailed reports on detected threat
Daily and automatically updated filter rules and signatures
24/7 support via a convenient ticket system

What is TDS

Threat Detection System is an effective tool for outsourcing routine processes, such as log analysis, event classification, allocation of critical incidents and response to detected threats.


Threat Detection System enables effective network traffic control and cyber threat detection at the network level in real-time, based on Group-IB’s unique expertise and exclusive intelligence information.


Similar products
Knowledge of actual threats with signature based detection and 24/7 support
Outsourcing log analysis and manually sieving out the most important events
Flexible set-up to integrate with IT infrastructure
Rapid incident response and digital evidence provided in accordance with international standards

How TDS works

The TDS sensor is a physical server running a DPI solution for analysis of all incoming and outgoing traffic. A set of signatures used to identify harmful activities, a black list of botnet controller addresses, as well as filter rules are automatically updated daily.

The sensor transmits information about detected incidents over a secure channel to a Group-IB cloud data center, where events are sorted and manually analyzed by Group-IB specialists.

Data is analyzed 24/7/365.

All threat reports are available in the web interface. You can specify or request additional information from Group-IB analysts via a convenient ticket system.

Independent data analysis solution may be provided through the local web interface. The event flow can be sent automatically to any SIEM or log storage system via the syslog protocol.

An Internal ticket system for incident response can be integrated into the local web interface. The system may be completely isolated from the Internet with an internal update center.

The signature base is constantly updated to reflect new threats identified by Group-IB.

Technical specification

Form factor
Dimensions in mm
42,4 × 434 × 394,3
42,4 × 434 × 394,3
42,4 × 434 × 394,3
Power supply
1 × 250W
1 × 250W
2 × 350W
Network interfaces for traffic reception
1 × 1000BASE-T
2 × 1000BASE-T
4 × 1000BASE-T
Peak rate in Mbit/s
1 000

Our clients

About Group-IB

Group-IB is one of the global leaders in preventing and investigating high-tech crimes and online fraud. Since 2003, the company has been active in the field of computer forensics and information security, protecting the largest international companies against financial losses and reputation risks.

We are recognized by Gartner as a threat intelligence vendor with strong cyber security focus and the ability to provide leading insight to the Eastern European region and recommended by the Organization for Security and Co-operation in Europe (OSCE).

Group-IB’s experience and threat intelligence has been fused into an eco-system of highly sophisticated software and hardware solutions to monitor, identify and prevent cyber threats.

Learn more

Advanced protection against cyber threats

Group-IB’s security ecosystem provides comprehensive protection for your IT infrastructure based on our unique cyber intelligence and deep analysis of attacks and incident response.


Learn about threats, leakages, attacks, and hacking activity before they can harm your business


Detect malicious incidents in your internal network to prevent intrusions, attacks, data leaks, and espionage

Secure Bank

Get the most of your antifraud systems and instantly protect all of your clients

Secure Portal

Protect your customers and citizens with innovative solutions for e-commerce
& e-government

Threat Detection System

Try TDS in action — VM installation for easy access.
Please leave us your contact information to arrange
a free proof of concept.

Thank you for the inquiry! We will contact you soon to schedule your free trial.