Polymorphic Threat Intelligence

Threat Detection Engine

— Behaviour based detection of network attacks, and application layer Attacks that simplifies complex decision making when under attack —

Behaviour-Based detection

— We start with high accuracy in all scenarios and then tailor between response time and certainty based on your needs —

Reduce False Positives

We’re looking at individual IPs behind the traffic, understanding complex patterns using a wide range of parameters. The system starts learning after just 24 hours of analysis and you can also manually train it through time

Drill Down with Forensics

Quickly cycle through visualizations to drill into points of interest. Drill down through trillions of data-points in less than a second

Types of Attacks Detected

— Our Indicators Of Compromise (IOCs) database can detect potential malware and trojans based on traffic being exchanged with such compromised IPs —


This is when Ransomware has been activated on your network and is reaching out for the encryption key exchange. Ransomware malware makes hundreds, if not thousands of calls out of the business.

Spam/Phishing Schemes

This is when the known spam or phishing schemes flows through the network that are identified by the IANA (Internet Assigned Numbers Authority), the Internet Storm Center or other highly respected cybersecurity sharing sites.


Bogons are bogus IP addresses that have no legitimate use. They are usually the result of accidental misconfiguration but sometimes can be due to malicious configuration and therefore should be blocked.

Tor (DarkWeb)

The dark web is the World Wide Web content that exists on darknets, overlay networks that use the Internet but require specific software, configurations or authorization to access.


Torrenting is a peer-to-peer technology that doesn't have a single point of failure but its most common use is to share copyrighted material (movies, music, software) which is often infected with malicious content.

Crypto Jacking

CryptoJacking is a form of cyber-attack in which a hacker hijacks a target's processing power in order to mine cryptocurrency on the hacker's behalf. This can be done through a malicious ad on a website / vulnerable web browser.

Trusted By NetOps & SecOps

Loved by Service Providers, Data-Centers, and Multi-Cloud businesses
— Taking away all the complexity by getting Big-Data and Machine Learning to work for you —