Secure your core telecom network
Can your security keep up with you?
Stop being an easy target
Don't let hackers worm their way in
Critical infrastructure on the frontline
Take control of your ERP security
Turn policies into protection
Vulnerability & compliance management.
PT Application Firewall
Intelligent protection of business applications.
PT Application Inspector
Actionable security for web applications.
Cyberthreat detection and incident response in ICS.
PT SS7 Attack Discovery
Intrusion detection across all SS7 attack vectors.
Multi-engine stream-based antimalware platform.
ICS/SCADA Security Assessment
Full Range of ICS-specific Security Services
Cell Network Security Assessment
Protect Your Revenues and Reputation from Network Breaches
ATM Security Assessments
Uncover Your Weaknesses
Web Application Security Services
Black Box and White Box Analysis
Mobile Application Security Services
Security Analysis and Compliance Audit
Custom Application Security Services
Independent Expert Analysis of Your Source Code
Secure Application Development at Your Organization
A Comprehensive Approach
Forensic Investigation Services
Prevent Future Incidents
Advanced Border Control
Upgrade Your View of Perimeter Security
Licenses and Certificates
Positive Technologies is a cybersecurity leader.
Our mission is two-fold: to research the latest digital threats,
and to create products and services that help to keep computing systems safe.
January 16, 2017
Debugging mechanism in Intel CPUs allows seizing control via USB port
December 22, 2016
Positive Technologies Advises ATM Industry on Serious Vulnerability in Security Software
December 16, 2016
Positive Technologies Reveals How Criminals Hacked ATMs
Director of Communications, Europe
PT in the Media
January 12, 2017
Intel Skylake, Kabylake Vulnerable to USB Port Debugging Exploit, Says Research
January 12, 2017
Crims shut off Ukraine power in wide-ranging anniversary hacks
January 11, 2017
Ukranian power outage: Are hackers testing for worldwide SCADA cyber attacks?
January 10, 2017
Intel Skylake, Kaby Lake Processors Vulnerable To USB Port Debugging Exploit Says Researchers
IoT Tech Expo Global 2017
January 23-24, 2017
Cyber Defence & Network Security Conference
January 24-26, 2017