We took a look at 23 SIEM pilot deployments and collected the most interesting results in our new report Findings include the uses to which clients put MaxPatrol SIEM, the event sources they connect most often, and the kinds of security incidents they detected
Learn how the network detection and response system PT Network Attack Detection can identify 117 adversary techniques described in MITRE ATT&CK
MaxPatrol SIEM 6 2 increases the data processing rate to up to 60,000 EPS and speeds up investigations for all installations The features of the new version of MaxPatrol SIEM are especially useful for organizations with large geographically distributed infrastructures
The analysis of network traffic at 41 large companies has shown that, regardless of the sector, there are violations of infosec regulations in 100% of corporate networks, suspicious traffic in 90%, and malware activity in 68% of them What's wrong with the networks of large companies? With the new version of the PT Network Attack Discovery traffic analysis system, you can detect attacks using new analytics modules, collect up-to-date information about network hosts, and centrally learn about detected threats in a single feed *Source code analysis tool which combines SAST, DAST, IAST and other technologies and has capability to generate test queries to verify detected vulnerabilities. With Application Inspector, security professionals detect and confirm vulnerabilities, as well as undocumented features. And developers can quickly fix code early on.
Where is traffic visibility higher: on the perimeter or inside the network? What threats do security experts detect most often? Network visibility or encryption? Why do we need traffic analysis? The answers to all these questions can be found in our recent analytical report The report includes opinions of 231 security experts
Three times Visionary in Gartner Magic Quadrant for Web Application Firewalls We find 800+ vulnerabilities in web applications every year One of the world's largest security research centers 20 years of practical experience on the security market PT Application Firewall and MaxPatrol are Common Criteria conformant 50 infrastructure hack investigations performed yearly Our experts perform over 40 security audits of web applications every year 200+ types of vulnerabilities identified during pentests every year One of the world's largest vulnerability knowledge bases 20+ pentests per year make our experience one-of-a-kind 100+ e-banking vulnerabilities found every year We find over 80 zero-days every year We find 31,000 vulnerabilities on average in corporate systems 150+ zero-days in SCADA systems identified and responsibly disclosed to manufacturers Our speakers present at Defcon, Black Hat, CCC, PacSec, CanSecWest, HITB, SAS and others Over 200 security audits of corporate systems performed every year 10+ e-banking security audits every year PT ISIM listed in the Gartner OT Security Market Guide
“Positive Technologies exceeded our expectations by demonstrating both a deep technical knowledge of penetration testing and an understanding of how security risks can impact a business” Jürgen Streit, director of IT-security Tech Data
Business Hours