Secure your core telecom network
Can your security keep up with you?
Stop being an easy target
Don't let hackers worm their way in
Critical infrastructure on the frontline
Take control of your ERP security
Turn policies into protection
Vulnerability & compliance management.
PT Application Firewall
Intelligent protection of business applications.
PT Application Inspector
Actionable security for web applications.
Cyberthreat detection and incident response in ICS.
PT SS7 Attack Discovery
Intrusion detection across all SS7 attack vectors.
Multi-engine stream-based antimalware platform.
ICS/SCADA Security Assessment
Full Range of ICS-specific Security Services
Cell Network Security Assessment
Protect Your Revenues and Reputation from Network Breaches
ATM Security Assessments
Uncover Your Weaknesses
Web Application Security Services
Black Box and White Box Analysis
Mobile Application Security Services
Security Analysis and Compliance Audit
Custom Application Security Services
Independent Expert Analysis of Your Source Code
Secure Application Development at Your Organization
A Comprehensive Approach
Forensic Investigation Services
Prevent Future Incidents
Advanced Border Control
Upgrade Your View of Perimeter Security
Licenses and Certificates
The Only Visionary WAF
Gartner places Positive Technologies
in Visionaries Quadrant for the second year running.
Try and Buy
The Only Visionary WAF on the market.
Uniquely positioned. High Security Focus.
Critical Infrastructure on the Front Line
Converge IT and OT security and manage the unique operational procedures,
threat models and protocols of ICS/SCADA environments.
Join Our Positive Channel
The Positive Technologies partner program provides a wide range of partner benefits,
which saw a 104% increase in annual world wide partner revenues in 2015.
January 20, 2017
Positive Technologies works with GE to highlight vulnerability that could allow interception of passwords in power stations, utility providers and factories
January 16, 2017
Debugging mechanism in Intel CPUs allows seizing control via USB port
December 22, 2016
Positive Technologies Advises ATM Industry on Serious Vulnerability in Security Software
IoT Tech Expo Global 2017
January 23-24, 2017
Cyber Defence & Network Security Conference
January 24-26, 2017
About Positive Technologies
Over 50 methods discovered for exploiting telecom vulnerabilities
24x7 client support
200+ types of vulnerabilities identified during pentests every year
One of the world's largest vulnerability knowledge bases
20+ pentests per year make our experience one-of-a-kind
Our speakers present at Defcon, Black Hat, CCC, PacSec, CanSecWest, HITB, SAS and others
Over 200 security audits of corporate systems performed every year
20+ e-banking security analyses every year
We find 1,500+ vulnerabilities in corporate systems every year
One of the world's largest security research centers
25 infrastructure hack investigations performed yearly
PT ISIM and PT SS7 Attack Discovery listed in the Gartner OT Security Market Guide
Our experts perform over 50 security audits of web applications every year
150+ zero-days in SCADA systems identified and responsibly disclosed to manufacturers
PT Application Firewall and MaxPatrol are Common Criteria conformant
The only Visionary in Web Application Firewalls (Gartner Magic Quadrant 2016)
We find 700+ vulnerabilities in web applications every year
Our specialists are members of WASC, CIS, CEH, ISACA
Dozens of zero-day vulnerabilities found in telecom systems
15 years of practical experience on the security market
500+ web and mobile application security studies
We find over 200 zero-days every year
16 SS7 security research projects in the past year
180+ e-banking vulnerabilities found every year
December 16, 2016
Cobalt—a new trend or an old 'friend'?
November 2, 2016
Vulnerabilities in Industrial Control Systems 2016
October 20, 2016
Vulnerabilities in Online Banking Systems 2016
October 18, 2016
Positive Research 2016
Trusted by the Biggest Names in Business
“Positive Technologies exceeded our expectations by demonstrating both a deep technical knowledge of penetration testing and an understanding of how security risks can impact a business”
Jürgen Streit, director of IT-security