Help achieve results-oriented cybersecurity and protect companies from hacker attacks.
Directions
Infrastructure security
Comprehensive protection of companies from cyberthreats.
Industrial network security
Protecting manufacturing companies from cyberthreats at the network, system, and application level.
Secure development
Protection of applications throughout the entire lifecycle: from development to operation.
Protecting containers and cloud environments
Ensuring secure operation in public, private, and hybrid clouds, as well as container environments.
Products
MaxPatrol VMMaxPatrol VM is a next-generation vulnerability management system. The solution allows you to build a full-fledged vulnerability management process and control it during both routine operation and urgent scanning.
PT SandboxPT Sandbox is an advanced sandbox with customizable virtual environments. Protects against targeted and mass attacks that involve the unknown malware and 0-day threats. Detects and blocks threats in email, web traffic, and file storages.
MaxPatrol SIEM All-in-OneMaxPatrol SIEM All-in-One provides full visibility into small to mid-sized IT infrastructures and detects security incidents. Get a full-featured SIEM system that works, even on a smaller budget.
XSpiderXSpider is a vulnerability scanner for seeing the real state of security on your IT infrastructure. Quickly and precisely enumerate your network components, scan network resources for vulnerabilities, and get recommendations for remediation.
PT Network Attack DiscoveryPT Network Attack Discovery is a deep network traffic analysis (NTA) system for detecting attacks on the perimeter and inside your network. The system spots network events, detects malicious activity even in encrypted traffic, and helps investigate incidents.
MaxPatrol SIEMMaxPatrol SIEM provides 360º visibility into infrastructure and detects security incidents. Regularly updated with knowledge from Positive Technologies experts. Effortlessly adapts to network changes.
PT BlackBoxPT BlackBox is a black-box security scanner for web applications. It makes the job of security researchers easier and provides useful information to help fix vulnerabilities.
MaxPatrol 8Vulnerability and compliance management system. Pentesting, auditing, and compliance testing combined with analysis of operating systems, databases, and web apps. Continuous monitoring of security at all levels of information infrastructure. One of the world's largest regularly updated vulnerability knowledge bases.
PT Application FirewallPT Application Firewall (PT AF) is a smart protection solution based on advanced technologies and ongoing global research. It provides proactive and continuous protection for your internet-accessible applications against both known and unknown attacks, including the OWASP Top 10, automated and client-side attacks, and zero-days.
PT Application InspectorPT Application Inspector protects web applications of every scale: from landing pages and corporate portals to commerce, cloud services, and e-government systems. This multipurpose tool detects vulnerabilities and signs of undocumented features at each stage of the web application lifecycle.
Solutions
ICS/SCADAOur active collaboration with leading ICS vendors such as Honeywell, Schneider Electric, Siemens, and Yokogawa and our experience conducting regular security audits on these large-scale systems give Positive Technologies a unique understanding of how to detect and eliminate dangerous SCADA vulnerabilities. Let us help your organization start protecting its most critical assets today.
Vulnerability ManagementNo matter the attack vector, cybercriminals operate on the premise that vulnerabilities exist. Stay ahead of them with advanced solutions that cover all your systems without exception. Build a continuous response to the constant threat and create a strong process with the most cutting-edge tools on the market.
PT Industrial Cybersecurity Suite PT Industrial Cybersecurity Suite is the first integrated platform to protect industrial systems from cyberthreats. It helps identify attacks at any stage in an industrial environment and respond to them swiftly. PT ICS provides comprehensive security for industrial systems, covering everything from network hosts to individual devices.
Protection from targeted attacks (anti-apt)PT Anti-APT detects and prevents targeted attacks. It enables detecting attacker presence on the network with maximum speed and recreating a full picture for thorough investigation. At the core of the solution is a unique knowledge base, which is regularly supplemented based on our pentesting, investigations of complex incidents, and security testing of various systems.
Financial ServicesWith governments turning up the regulatory heat on banks and financial firms, coupled with the demand for mobile banking applications, it’s time for financial companies to rethink their security and compliance strategy. Our approach to security for banks and other financial institutions includes penetration and online banking security testing, ATM security assessments, and SSDL consulting.
UtilitiesSeeking to improve efficiencies, enrich customer service, and reduce operating costs, many utilities have opted for using standard technologies and connections to private and public networks. But these same technologies and connectivity also dramatically increase the risk of cyberattacks on critical services.
ERP SecurityAs a recognized global authority on ERP security, the specialists at Positive Technologies routinely conduct security assessments on operational SAP systems and work with SAP to eliminate software vulnerabilities. What’s more, our MaxPatrol vulnerability and compliance management solution is the only SAP-certified automated vulnerability and compliance management solution available.
Security ComplianceGet the technical checks needed to prove compliance. Strengthen your security. Make compliance part of your everyday practice. See when changes compromise your defenses. And significantly accelerate your incident response and remediation times—all while drastically reducing your costs associated with compliance. Now that’s a smarter approach to compliance management.