English
  • Russian
  • Korean
  • Support
Positive Technologies
English
  • Russian
  • Korean
  • Solutions
    ICS/SCADA

    Critical infrastructure on the frontline

    Protection from targeted attacks (anti-apt)

    Early detection, rapid investigation

    Security Compliance

    Turn policies into protection

    Vulnerability Management

    Stop being an easy target

    Utilities

    Industrial-grade cybersecurity

    Financial Services

    Can your security keep up with you?

    ERP Security

    Take control of your ERP security

    View all →
  • Products
    MaxPatrol

    Vulnerability and compliance management system.

    PT Application Inspector

    Source code analysis tool.

    PT Sandbox

    Advanced sandbox with customizable virtual environments

    PT MultiScanner

    Multilayered protection against malware attacks.

    MaxPatrol SIEM

    Knows your infrastructure, delivers pinpoint detection.

    PT ISIM

    Cyberthreat detection and incident response in ICS.

    XSpider

    Vulnerability scanner.

    PT Application Firewall

    Intelligent protection of business applications.

    PT Network Attack Discovery

    NTA system to detect attacks on the perimeter and inside the network.

    MaxPatrol SIEM All-in-One

    Full-featured SIEM for mid-sized IT infrastructures

    View all →
  • Services
    ICS/SCADA Security Assessment

    Full Range of ICS-specific Security Services

    Mobile Application Security Services

    Security Analysis and Compliance Audit

    Penetration Testing

    A Comprehensive Approach

    ATM Security Assessments

    Uncover Your Weaknesses

    Custom Application Security Services

    Independent Expert Analysis of Your Source Code

    Forensic Investigation Services

    Prevent Future Incidents

    Web Application Security Services

    Black Box and White Box Analysis

    SSDL Implementation

    Secure Application Development at Your Organization

    Advanced Border Control

    Upgrade Your View of Perimeter Security

    View all →
  • Analytics
    Threatscape
    PT ESC Threat Intelligence
    Cybersecurity glossary
    Knowledge base
    Research Blog
    View all →
  • Partners
    Authorized Partners
    Distributors
    Technology Partners
    View all →
  • About
    Clients
    Press
    News
    Events
    Contacts
    Documents and Materials
    View all →
Menu
  • Home
  • Sitemap
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
    • SAST, DAST, IAST, and RASP: how to choose?
    • How to prevent SQL injection attacks
    • What is a cross-site scripting (XSS) attack?
    • What is a web application firewall?
    • Securing Web Applications: OWASP Top 10 Vulnerabilities and what to do about them
    • Application Security requirements: GDPR vs. CCPA
    • Network traffic analysis: what is it, and why do we need NTA systems?
    • How to approach secure software development
    • Work from home: digital distancing to keep your network safe
    • What companies can do to stay safe
    • Top 5 technology trends for SIEM in the next three years
  • Positive Research 2020
  • Corporate network visibility in 2020
  • Security trends & vulnerabilities review: financial systems (2017)
  • How hackers rob banks
  • New bank attacks
  • ATM logic attacks: scenarios, 2018
  • Financial application vulnerabilities
  • Vulnerabilities in online banking applications
  • ICS Security: 2016 year in review
  • ICS Security: 2017 in review
  • Industrial companies: attack vectors
  • ICS vulnerabilities: 2018 in review
  • Corporate information system penetration testing: attack scenarios
  • Attacks on corporate Wi-Fi networks
  • Security trends & vulnerabilities review: corporate information systems
  • Social engineering: how the human factor puts your company at risk
  • Penetration testing of corporate information systems: statistics and findings, 2019
  • Vulnerabilities in Corporate Information Systems 2018
  • Top cybersecurity threats on enterprise networks
  • Access for sale
  • External pentests results – 2020
  • Internal pentests results - 2020
  • Going beyond the ordinary: how SIEM does incident detection, 2020
  • Vulnerabilities on the corporate network perimeter
  • Web application attack trends
  • Web application attack statistics: Q1 2017
  • Security trends & vulnerabilities review: web applications (2017)
  • Web Application Attack Statistics: Q2 2017
  • Web Application Attack Statistics: Q3 2017
  • Web application attack statistics: Q4 2017
  • Automated code analysis: web application vulnerabilities in 2017
  • Web application vulnerabilities: statistics for 2017
  • Web application attack statistics: 2017 in review
  • Web application vulnerabilities: statistics for 2018
  • Attacks on web applications: 2018 in review
  • Web Applications vulnerabilities and threats: statistics for 2019
  • Cybersecurity threatscape: Q1 2017
  • Cobalt strikes back: an evolving multinational threat to finance
  • Cybersecurity Threatscape: Q2 2017
  • Cybersecurity threatscape: Q3 2017
  • Cybersecurity threatscape: Q4 2017
  • Cybersecurity threatscape 2017: trends and forecasts
  • Cybersecurity threatscape: Q1 2018
  • The criminal cyberservices market
  • Cybersecurity threatscape: Q2 2018
  • Cybersecurity threatscape: Q3 2018
  • Cybersecurity threatscape: Q4 2018
  • Cybersecurity threatscape 2018: trends and forecasts
  • Cybersecurity threatscape: Q1 2019
  • Cybersecurity threatscape: Q2 2019
  • Cybersecurity threatscape: Q3 2019
  • Cybersecurity 2019-2020
  • Cybersecurity threatscape: Q4 2019
  • Cybersecurity Threatscape 2019
  • Cybersecurity threatscape, Q1 2020
  • Cybersecurity threatscape: Q2 2020
  • Cybersecurity threatscape: Q3 2020
  • Vulnerabilities and threats in mobile applications, 2019
  • Vulnerabilities and threats in mobile banking
  • Positive Research 2019
  • Disabling Intel ME 11 via undocumented mode
  • Where there’s a JTAG, there’s a way: obtaining full system access via USB
  • Hack at all cost: putting a price on APT attacks
  • Operation TaskMasters: Cyberespionage in the digital economy age
  • Calypso APT: new group attacking state institutions
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • XSpider
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • SSDL Implementation
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Partners
  • Authorized Partners
  • Distributors
  • Technology Partners
About
  • Clients
  • Press
  • News
  • Events
    • Attackers are Innovating: Is your WAF? A Positive Technologies Webinar
    • Webinar: Is your Mobile API under silent attack?
    • Security Session’18
    • GSMA Fraud & Security Group (FASG #11)
    • GSMA Latin America Plenary Meeting
    • Cybersecurity from La Plata River
    • Industrial Cybersecurity Workshops
    • ITU GSR GENEVA 2018
    • Telecommunications Network Security: A 5-Step Guide
    • Positive Guide to a Successful Signaling Protection Strategy
    • The Standoff recap
  • Contacts
  • Documents and Materials
Terms of use
Privacy policy
Cookie Notice
License agreement
Consent to process personal data to analyze the target audience of PT ISIM freeView Sensor software
Consent to process personal data to receive additional information materials about Company’s activity
Solutions
  • ICS/SCADA
  • Vulnerability Management
  • Financial Services
  • Protection from targeted attacks (anti-apt)
  • Utilities
  • ERP Security
  • Security Compliance
Products
  • MaxPatrol
  • MaxPatrol SIEM
  • PT Application Firewall
  • PT Application Inspector
  • PT ISIM
  • PT Network Attack Discovery
  • PT Sandbox
  • XSpider
  • MaxPatrol SIEM All-in-One
  • PT MultiScanner
Services
  • ICS/SCADA Security Assessment
  • ATM Security Assessments
  • Web Application Security Services
  • Mobile Application Security Services
  • Custom Application Security Services
  • SSDL Implementation
  • Penetration Testing
  • Forensic Investigation Services
  • Advanced Border Control
Analytics
  • Threatscape
  • PT ESC Threat Intelligence
  • Cybersecurity glossary
  • Knowledge base
  • Research Blog
Partners
  • Authorized Partners
  • Distributors
  • Technology Partners
About
  • Clients
  • Press
  • News
  • Events
  • Contacts
  • Documents and Materials
Positive Technologies
Copyright © 2002-2021 Positive Technologies
Find us:
  • Terms of Use
  • Privacy policy
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap
Copyright © 2002-2021 Positive Technologies
  • Terms of Use
  • Privacy policy
  • Positive Coordinated Vulnerability Disclosure Policy
  • Sitemap