Products

All Positive Technologies solutions are designed from the ground-up with industry-specific knowledge of how to protect business and a firm grasp of regulatory requirements. Company specialists lend their expertise to the standards-writing process to strengthen security requirements. Our products are compliant with a wide range of national and international security standards, including PCI DSS.
MaxPatrol Read more

Vulnerability and compliance management system. Pentesting, auditing, and compliance testing combined with analysis of operating systems, databases, and web apps. Continuous monitoring of security at all levels of information infrastructure. One of the world's largest regularly updated vulnerability knowledge bases.

PT Application Firewall Read more

PT Application Firewall is a smart protection solution based on advanced technologies and ongoing global research. It provides proactive and continuous protection for your internet-accessible applications against both known and unknown attacks, including the OWASP Top 10, automated and client-side attacks, and zero-days.

PT Application Inspector Read more

PT Application Inspector protects web applications of every scale: from landing pages and corporate portals to commerce, cloud services, and e-government systems. This multipurpose tool detects vulnerabilities and signs of undocumented features at each stage of the web application lifecycle.

PT ISIM Read more

PT Industrial Security Incident Manager detects hacker attacks on ICS/SCADA systems and helps to investigate cybersecurity incidents at critical sites. Without interrupting normal operations, PT ISIM works in parallel to analyze a copy of network traffic, pinpoints relationships between security events, and shows easy-to-understand visualizations of potential attacks in the context of network topology and site layout.

PT Telecom Attack Discovery Read more

PT Telecom Attack Discovery provides security monitoring, up-to-the-minute detection of anomalous activity, and protection of the signaling network perimeter. Rich analytics and reporting capabilities enable telecom operators to act immediately and respond to threats as they occur. Deploy PT Telecom Attack Discovery to get ahead of hacker attacks before they threaten your core network and subscribers.

PT MultiScanner Read more

For maximum speed and accuracy in threat detection, PT MultiScanner performs multithreaded scanning combining several of the most popular anti-virus engines, along with other methods, including retrospective analysis of malicious file actions and reputation services.