Find out what your peers are saying about Darktrace, Vectra AI, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS).
Our unique technology detects the most advanced threats, made with the most crafted exploitation methods (polymorphism, obfuscation, encoding, ROPchain…) and the threats based on all types of malicious files (ransomware, cryptolocker…).
Trackwatch® can be deployed from two types of devices: GCAP and GCENTER.
GCAP ensures the collection of network traffic flows and a portion of the anlyses. A GCAP is connected to a switch with a mirror port or to a TAP that copies the network traffic. One or more GCAPs can be deployed within an infrastructure, either locally or at remote sites. The GCAP(s) are connected to a GCENTER management device.
The GCENTER nalyses the information sent back by the GCAP, stores it, provides configuration and reporting interfaces, and exports the information to a security information and event management (SIEM).
Our cybersecurity activities revolve around several divisions: - Cybersecurity consultancy & audit services (intrusive audit, organizational audit, code audit, forensic, support in developing ISS policy / disaster recovery plan / business continuity plan, assistance in achieving ISO 2700x / GDPR conformity). - Product development: a vulnerability management tool - IKare vulnerability scanner - and a behavioral analysis engine - Reveelium Artificial Intelligence. - Managed security services: a SOC (Security Operations Center) for companies wishing to outsource their ISS.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.