Secure your core telecom network
Can your security keep up with you?
Stop being an easy target
Don't let hackers worm their way in
Critical infrastructure on the frontline
Take control of your ERP security
Turn policies into protection
Vulnerability & compliance management.
PT Application Firewall
Intelligent protection of business applications.
PT Application Inspector
Actionable security for web applications.
Cyberthreat detection and incident response in ICS.
PT SS7 Attack Discovery
Intrusion detection across all SS7 attack vectors.
Multi-engine stream-based antimalware platform.
ICS/SCADA Security Assessment
Full Range of ICS-specific Security Services
Cell Network Security Assessment
Protect Your Revenues and Reputation from Network Breaches
ATM Security Assessments
Uncover Your Weaknesses
Web Application Security Services
Black Box and White Box Analysis
Mobile Application Security Services
Security Analysis and Compliance Audit
Custom Application Security Services
Independent Expert Analysis of Your Source Code
Secure Application Development at Your Organization
A Comprehensive Approach
Forensic Investigation Services
Prevent Future Incidents
Advanced Border Control
Upgrade Your View of Perimeter Security
Licenses and Certificates
The Only Visionary WAF
Gartner places Positive Technologies
in Visionaries Quadrant for the second year running.
Try and Buy
The Only Visionary WAF on the market.
Uniquely positioned. High Security Focus.
Critical Infrastructure on the Front Line
Converge IT and OT security and manage the unique operational procedures,
threat models and protocols of ICS/SCADA environments.
Join Our Positive Channel
The Positive Technologies partner program provides a wide range of partner benefits,
which saw a 104% increase in annual world wide partner revenues in 2015.
March 16, 2017
Positive Technologies discovers and fixes a dangerous 7-year old Linux Kernel vulnerability
February 14, 2017
Positive Technologies accelerates international growth with senior hires
February 7, 2017
Positive Technologies launches PT VIP Protect to allow mobile operators to safeguard high-profile figures from targeted phone hacks
IANS Washington DC Information Security Forum
April 12–13, 2017
Washington DC, USA
Financial Services Information Security Network
April 24–25, 2017
About Positive Technologies
The only Visionary in Web Application Firewalls (Gartner Magic Quadrant 2016)
20+ e-banking security analyses every year
180+ e-banking vulnerabilities found every year
Over 50 methods discovered for exploiting telecom vulnerabilities
500+ web and mobile application security studies
One of the world's largest vulnerability knowledge bases
PT Application Firewall and MaxPatrol are Common Criteria conformant
We find 1,500+ vulnerabilities in corporate systems every year
Our speakers present at Defcon, Black Hat, CCC, PacSec, CanSecWest, HITB, SAS and others
Dozens of zero-day vulnerabilities found in telecom systems
15 years of practical experience on the security market
We find 700+ vulnerabilities in web applications every year
150+ zero-days in SCADA systems identified and responsibly disclosed to manufacturers
PT ISIM and PT SS7 Attack Discovery listed in the Gartner OT Security Market Guide
We find over 200 zero-days every year
Over 200 security audits of corporate systems performed every year
25 infrastructure hack investigations performed yearly
24x7 client support
Our specialists are members of WASC, CIS, CEH, ISACA
20+ pentests per year make our experience one-of-a-kind
200+ types of vulnerabilities identified during pentests every year
16 SS7 security research projects in the past year
Our experts perform over 50 security audits of web applications every year
One of the world's largest security research centers
February 8, 2017
Web application attack trends
December 16, 2016
Cobalt—a new trend or an old 'friend'?
November 2, 2016
Vulnerabilities in Industrial Control Systems 2016
October 20, 2016
Vulnerabilities in Online Banking Systems 2016
Trusted by the Biggest Names in Business
“Positive Technologies exceeded our expectations by demonstrating both a deep technical knowledge of penetration testing and an understanding of how security risks can impact a business”
Jürgen Streit, director of IT-security