Services

Positive Technologies offers its clients an approach that simultaneously maintains compliance with laws and industry regulations, while taking advantage of international best practices. Thanks to our experts' knowledge of the real-world methods that hackers use to penetrate corporate networks, we can offer the most effective solutions for protecting your information assets.
ICS/SCADA Security Assessment

We offer a full range of ICS security services to identify potential vulnerabilities in your ICS environment and determine your level of compliance with technical elements of standards including CIS, NERC CIP, and ISA99. Our ICS security experts will conduct ICS security assessments, technical audits, safety studies, and develop security benchmarks and configuration hardening guides for your ICS components.

Read more
Telecom Security Assessment

PT Telecom Security Assessment is a flagship service that provides unbiased evaluation of the current signaling network protection level. Discover critical vulnerabilities before they strike and make sure that your current security measures are getting the job done. PT Telecom Security Assessment is an essential step to building an effective signaling vulnerability management process and shielding your core network and subscribers from cyberattacks.

Read more
ATM Security Assessments

Our experts will uncover vulnerabilities in your ATM network that could allow attackers to gain control over systems and commit fraud. We can also help secure your ATMs with a series of hands-on vulnerability assessments that consider the entire ATM environment.

Read more
Web Application Security Services

Our experts will provide a detailed analysis of your application’s design, networking, operating system settings, external data sources, data warehousing, authorization mechanisms, and authentication of server and client components—using both black-box and white-box testing methods.

Read more
Mobile Application Security Services

We use techniques and tools of our own design as well as methodologies recognized by the Web Application Security Consortium (WASC) and the Open Web Application Security Project (OWASP). Our expert assessment includes automated testing, manual vulnerability analysis, a search for attack vectors that could exploit your weaknesses, and appraisal of compliance with industry standards.

Read more
Custom Application Security Services

Get an independent, expert analysis of your source code in relation to known attack methods. Our experts can handle huge amounts of source code (tens of megabytes) and code generated using many different programming languages and technologies. Let us put our decade-long experience conducting custom code analysis for large enterprises to work for you.

Read more
SSDL Implementation

Our specialists provide a complete range of services to help you introduce the procedures necessary for secure application development. Our experts will help establish procedures allowing you to develop security requirements and risk assessments, design secure architectures, verify code, implement and deploy your code securely, and respond to security incidents.

Read more
Penetration Testing

Our experts combine the information they collect to demonstrate how hackers can piece together weaknesses to circumvent your existing security mechanisms, escalate network privileges, gain access to confidential information, modify your DBMS, or persuade users to sidestep compliance with existing security policies.


Read more
Forensic Investigation Services

Our expert analysis of intrusion incidents includes an examination of your current organizational and technical environments, a judgment on the root cause of the breach, identification of those responsible, and tailored recommendations for preventing future incidents.

Read more
Advanced Border Control

Enterprise networks change at a breathtaking pace, creating a constantly shifting perimeter. Keeping track of the software, hosts, and services installed on this external border is a heavy burden, but it’s a task Information Security teams cannot afford to neglect.

Read more