- Security Assessment
- Red Teaming
- Compliance Audit
- Pre-IR Assessment
- Compromise Assessment
- Cyber Education
- GIB Crypto
Protects corporate emails from targeted phishing and letters containing malware
Protects the network perimeter, services, and user workstations from a malware
Protects infrastructure from being controlled by external attackers
Secures the transfer of files from untrusted to trusted file storages
Detects network anomalies
Protects workstations and servers from potentially unwanted apps and untrustworthy devices
Detection of previously unknown threats based on Threat Intelligence & Attribution data. Proactive search for anomalies, hidden tunnels, and signs of communications with C&C servers.
Automated correlation of events and alerts, and subsequent attribution to malware type and/or threat actor
Global proactive threat hunting that exposes adversaries’ external infrastructure, TTPs, intent, and plans
Proprietary tools: network graph analysis and malware detonation platform provide data enrichment, correlations, and analysis
Full overview of the attack, in-depth management of incidents (up to Mutex/Pipes/Registry/Files)
Technology conceived to collect a large amount of data and
unique search algorithms designed to find connections help
detect infrastructure that hackers intend to use in future attacks
Decrypting TLS/SSL traffic in the protected infrastructure
Spearphishing campaigns, social engineering techniques, legitimate utilities, and other tools used by advanced groups
Email, browsers, removable media, local networks, client applications, supply chain attacks
THF detects mobile Trojans when a device is connected to a corporate Wi-Fi network
When set in inline mode, the solution analyzes files and links in an isolated environment and blocks malicious objects spread by email
When integrated with file storage systems, the solution detects and blocks malicious files before they are launched in a real environment
When integrated via ICAP THF can block malicious files downloaded from the internet
Discovers anomalies, hidden communication channels. Performs behavioral analysis for software and users, and event correlation.
Patented technology performs dynamic analysis of malware in isolated environments on virtual machines and fully executes malicious code and extracts IoCs.
Provides shared environment, remote incident response, digital forensics, and access to analysts and cyber community
Hunts on hosts within and outside the network perimeter while also analyzing the infrastructure of external adversaries
Attributes scattered events to specific malware types and families or certain cybercriminal groups for efficient attack termination.
A single system contains all the necessary tools for adaptive automation of research, threat hunting, and IR.