English
  • Russian
  • Korean
  • Support
Positive Technologies
English
  • Russian
  • Korean
  • Solutions
    ICS/SCADA

    Critical infrastructure on the frontline

    Vulnerability Management

    Stop being an easy target

    Financial Services

    Can your security keep up with you?

    Protection from targeted attacks (anti-apt)

    Early detection, rapid investigation

    PT Industrial Cybersecurity Suite

    PT ICS is an integrated platform for cyberthreat detection and response in industrial systems

    Utilities

    Industrial-grade cybersecurity

    ERP Security

    Take control of your ERP security

    Security Compliance

    Turn policies into protection

    View all →
  • Products
    MaxPatrol 8

    Vulnerability and compliance management system.

    MaxPatrol SIEM

    Knows your infrastructure, delivers pinpoint detection.

    PT Application Firewall

    Intelligent protection of business applications.

    PT Application Inspector

    Source code analysis tool.

    PT ISIM

    Cyberthreat detection and incident response in ICS.

    PT Network Attack Discovery

    NDR system to detect attacks on the perimeter and inside the network.

    PT Sandbox

    Advanced sandbox with customizable virtual environments

    XSpider

    Vulnerability scanner.

    MaxPatrol VM

    Next-generation vulnerability management system.

    MaxPatrol SIEM All-in-One

    Full-featured SIEM for mid-sized IT infrastructures.

    PT MultiScanner

    Multilayered protection against malware attacks.

    PT BlackBox

    Dynamic application security testing tool

    View all →
  • Services
    ICS/SCADA Security Assessment

    Full Range of ICS-specific Security Services

    ATM Security Assessments

    Uncover Your Weaknesses

    Web Application Security Services

    Black Box and White Box Analysis

    Mobile Application Security Services

    Security Analysis and Compliance Audit

    Custom Application Security Services

    Independent Expert Analysis of Your Source Code

    Penetration Testing

    A Comprehensive Approach

    Forensic Investigation Services

    Prevent Future Incidents

    Advanced Border Control

    Upgrade Your View of Perimeter Security

    View all →
  • Analytics
    Threatscape
    PT ESC Threat Intelligence
    Cybersecurity glossary
    Knowledge base
    View all →
  • Partners
  • About
    Clients
    Press
    News
    Events
    Contacts
    Documents and Materials
    View all →
Menu
  • Home
  • Sitemap
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
    • SAST, DAST, IAST, and RASP: how to choose?
    • How to prevent SQL injection attacks
    • What is a cross-site scripting (XSS) attack?
    • What is a web application firewall?
    • Securing Web Applications: OWASP Top 10 Vulnerabilities and what to do about them
    • Application Security requirements: GDPR vs. CCPA
    • Network traffic analysis: what is it, and why do we need NTA systems?
    • How to approach secure software development
    • Work from home: digital distancing to keep your network safe
    • What companies can do to stay safe
    • Top 5 technology trends for SIEM in the next three years
    • How to detect a cyberattack and prevent money theft
  • Corporate network visibility in 2020
  • Top cyberthreats on enterprise networks. Network traffic monitoring: 2020 data
  • Positive Technologies' key research activities in 2019–2021
  • Cybersecurity 2020–2021
  • Top 10 most popular phishing topics in 2021
  • Security trends & vulnerabilities review: financial systems (2017)
  • How hackers rob banks
  • New bank attacks
  • ATM logic attacks: scenarios, 2018
  • Financial application vulnerabilities
  • Vulnerabilities in online banking applications
  • ICS Security: 2016 year in review
  • ICS Security: 2017 in review
  • Industrial companies: attack vectors
  • ICS vulnerabilities: 2018 in review
  • Information security risks at industrial companies
  • Corporate information system penetration testing: attack scenarios
  • Attacks on corporate Wi-Fi networks
  • Security trends & vulnerabilities review: corporate information systems
  • Social engineering: how the human factor puts your company at risk
  • Penetration testing of corporate information systems: statistics and findings, 2019
  • Vulnerabilities in Corporate Information Systems 2018
  • Top cybersecurity threats on enterprise networks
  • Access for sale
  • External pentests results – 2020
  • Internal pentests results - 2020
  • Going beyond the ordinary: how SIEM does incident detection, 2020
  • Vulnerabilities on the corporate network perimeter
  • Custom hacking services
  • Criminal Market for Initial Access
  • Business in the crosshairs: analyzing attack scenarios
  • Vulnerability management: user guide
  • Bootkits: evolution and detection methods
  • Cybercriminal market in Telegram
  • Results of penetration tests in 2022
  • Web application attack trends
  • Web application attack statistics: Q1 2017
  • Security trends & vulnerabilities review: web applications (2017)
  • Web Application Attack Statistics: Q2 2017
  • Web Application Attack Statistics: Q3 2017
  • Web application attack statistics: Q4 2017
  • Automated code analysis: web application vulnerabilities in 2017
  • Web application vulnerabilities: statistics for 2017
  • Web application attack statistics: 2017 in review
  • Web application vulnerabilities: statistics for 2018
  • Attacks on web applications: 2018 in review
  • Web Applications vulnerabilities and threats: statistics for 2019
  • Threats and vulnerabilities in web applications 2020–2021
  • Cybersecurity threatscape: Q1 2017
  • Cobalt strikes back: an evolving multinational threat to finance
  • Cybersecurity Threatscape: Q2 2017
  • Cybersecurity threatscape: Q3 2017
  • Cybersecurity threatscape: Q4 2017
  • Cybersecurity threatscape 2017: trends and forecasts
  • Cybersecurity threatscape: Q1 2018
  • The criminal cyberservices market
  • Cybersecurity threatscape: Q2 2018
  • Cybersecurity threatscape: Q3 2018
  • Cybersecurity threatscape: Q4 2018
  • Cybersecurity threatscape 2018: trends and forecasts
  • Cybersecurity threatscape: Q1 2019
  • Cybersecurity threatscape: Q2 2019
  • Cybersecurity threatscape: Q3 2019
  • Cybersecurity 2019-2020
  • Cybersecurity threatscape: Q4 2019
  • Cybersecurity Threatscape 2019
  • Cybersecurity threatscape, Q1 2020
  • Cybersecurity threatscape: Q2 2020
  • Cybersecurity threatscape: Q3 2020
  • Cybersecurity threatscape: Q4 2020
  • Cybersecurity Threatscape 2020
  • Cybersecurity threatscape: Q1 2021
  • Cybersecurity threatscape: Q2 2021
  • Rootkits: evolution and detection methods
  • Cybersecurity threatscape: Q3 2021
  • Cybersecurity threatscape: Q4 2021
  • Cybersecurity threatscape: year 2021 in review
  • Cybersecurity threatscape: Q1 2022
  • Cybersecurity threatscape: Q2 2022
  • Cybersecurity threatscape: Q3 2022
  • Vulnerabilities and threats in mobile applications, 2019
  • Vulnerabilities and threats in mobile banking
  • Positive Research 2019
  • Positive Research 2020
  • Positive Research 2021
  • Positive Research 2022
  • Disabling Intel ME 11 via undocumented mode
  • Where there’s a JTAG, there’s a way: obtaining full system access via USB
  • Sandbox detection and evasion techniques. How malware has evolved over the last 10 years
  • Security threats in the retail sector
  • Hack at all cost: putting a price on APT attacks
  • Operation TaskMasters: Cyberespionage in the digital economy age
  • Calypso APT: new group attacking state institutions
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • PT Industrial Cybersecurity Suite
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol 8
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol VM
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
  • PT BlackBox
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Partners
About
  • Clients
  • Press
  • News
  • Events
    • Attackers are Innovating: Is your WAF? A Positive Technologies Webinar
    • Webinar: Is your Mobile API under silent attack?
    • Industrial Cybersecurity Workshops
    • The Standoff recap
    • The Standoff: virtual guided tour of the worldwide cyberbattle
    • GITEX 2021 in Dubai
    • Vietnam Security Summit
    • Sincon 2021 Conference
    • ADIPEC 2021
    • Positive Technologies at GITEX Global 2022 in Dubai
  • Contacts
  • Documents and Materials
Cookie Notice
Privacy Notice
Terms of use
Report a vulnerability
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • PT Industrial Cybersecurity Suite
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol 8
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol VM
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
  • PT BlackBox
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
Partners
About
  • Clients
  • Press
  • News
  • Events
  • Contacts
  • Documents and Materials
Positive Technologies
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
Find us:
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap
Copyright © 2002—2023 Positive Technologies. All Rights Reserved.
  • Report a vulnerability
  • Help Portal
  • Terms of Use
  • Privacy Notice
  • Cookie Notice
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap