English
  • Russian
  • Korean
  • Support
Positive Technologies
English
  • Russian
  • Korean
  • Solutions
    ICS/SCADA

    Critical infrastructure on the frontline

    Vulnerability Management

    Stop being an easy target

    Financial Services

    Can your security keep up with you?

    Protection from targeted attacks (anti-apt)

    Early detection, rapid investigation

    PT Industrial Cybersecurity Suite

    PT ICS is an integrated platform for cyberthreat detection and response in industrial systems

    Utilities

    Industrial-grade cybersecurity

    ERP Security

    Take control of your ERP security

    Security Compliance

    Turn policies into protection

    View all →
  • Products
    MaxPatrol 8

    Vulnerability and compliance management system.

    MaxPatrol SIEM

    Knows your infrastructure, delivers pinpoint detection.

    PT Application Firewall

    Intelligent protection of business applications.

    PT Application Inspector

    Source code analysis tool.

    PT ISIM

    Cyberthreat detection and incident response in ICS.

    PT Network Attack Discovery

    NDR system to detect attacks on the perimeter and inside the network.

    PT Sandbox

    Advanced sandbox with customizable virtual environments

    XSpider

    Vulnerability scanner.

    MaxPatrol VM

    Next-generation vulnerability management system.

    MaxPatrol SIEM All-in-One

    Full-featured SIEM for mid-sized IT infrastructures.

    PT MultiScanner

    Multilayered protection against malware attacks.

    PT BlackBox

    Dynamic application security testing tool

    View all →
  • Services
    ICS/SCADA Security Assessment

    Full Range of ICS-specific Security Services

    ATM Security Assessments

    Uncover Your Weaknesses

    Web Application Security Services

    Black Box and White Box Analysis

    Mobile Application Security Services

    Security Analysis and Compliance Audit

    Custom Application Security Services

    Independent Expert Analysis of Your Source Code

    Penetration Testing

    A Comprehensive Approach

    Forensic Investigation Services

    Prevent Future Incidents

    Advanced Border Control

    Upgrade Your View of Perimeter Security

    View all →
  • Analytics
    Threatscape
    PT ESC Threat Intelligence
    Cybersecurity glossary
    Knowledge base
    View all →
  • Partners
  • About
    Clients
    Press
    News
    Events
    Contacts
    Documents and Materials
    View all →
Menu
  • Home
  • Services
  • Advanced Border Control

Advanced Border Control

Upgrade Your View of Perimeter Security

About Service

Enterprise networks change at a breathtaking pace, creating a constantly shifting perimeter. Keeping track of the software, hosts, and services installed on this external border is a heavy burden, but it’s a task information security teams cannot afford to neglect.

Vulnerable, unpatched, or misconfigured perimeter systems and services give an entryway to hackers and put the entire infrastructure at risk. In order to do their job, security teams need up-to-date lists of Internet-facing hosts.

PT Advanced Border Control Service (PT ABC) resolves this problem quickly and simply. Regular scans conducted from our hosted infrastructure provide a full, objective, and independent assessment of perimeter security as it changes over time.

PT Advanced Border Control Service: Key Benefits

  • Reveal hosts you were unaware of
  • Identify obsolete software versions
  • Uncover evidence of unauthorized access
  • Detect remote access interfaces
  • Expose insecure protocols
  • Diagnose errors in access control and network traffic filtering

Scan results and recommendations for mitigating risk are presented via a secure web portal and as weekly reports. The hosted service ensures rapid and hassle-free deployment, but PT ABC can also be installed at the client’s own data center (on premises) by request.

See Your Network the Way a Hacker Sees It

PT ABC scans help to pinpoint the flaws that attackers look for in your perimeter, including:

  • Unmonitored hosts and services—the first step to securing hosts and services is to be aware of them.
  • Outdated or vulnerable software versions—identifying critical vulnerabilities in software installed on your perimeter is essential for effective risk assessment and management.
  • Remote access interfaces (SSH, Telnet, web interfaces)—these are essential tools for administrators, but when used inappropriately they can be exploited for brute-force attacks, phishing, or traffic sniffing.
  • Insecure protocols—these can be used by attackers to eavesdrop on confidential information.
  • Errors in access control and network traffic filtering—misconfigurations can expose internal services to outsiders or lead to disclosure of infrastructure information.

Scanning by PT ABC of newly opened ports (including non-standard ports) can also reveal evidence of malware infections and vulnerability to unauthorized network access.

Contact us

By clicking Send you give your free and explicit consent to process your personal data and agree to our Privacy Policy

Company Services

  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • Penetration Testing
  • Forensic Investigation Services

Company Products

  • MaxPatrol VM
  • PT Sandbox
  • MaxPatrol SIEM All-in-One
  • XSpider
  • PT Network Attack Discovery
  • MaxPatrol SIEM
  • PT BlackBox
  • MaxPatrol 8
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT MultiScanner
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • PT Industrial Cybersecurity Suite
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol 8
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol VM
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
  • PT BlackBox
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
Partners
About
  • Clients
  • Press
  • News
  • Events
  • Contacts
  • Documents and Materials
Positive Technologies
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
Find us:
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap