

Certified
Detection system

What our customers praise
Your benefits
Trackwatch® enables the detection of concealed threats through their analysis using a combination of detection engines (static, heuristic, Machine Learning). This approach allows for rapid qualification and remediation by SOC experts who have access to the complete set of metadata.
Based on a wide range of hardware, Trackwatch® can operate in connected mode or completely offline for restricted and confidential networks. You retain control of your information. Its position in bypass (TAP) ensures no impact on your production environment.
Trackwatch® detects all types of malware through file analysis conducted by multiple anti-virus engines. The platform can examine up to 6 million files per 24 hours and retro-analyze files flagged as suspicious after their passage.
The features

Threat prioritisation
Alerts are aggregated, allowing rapid triage against an evolving risk score, which is linked directly to your IS. This approach accelerates decision-making by SOC experts, expediting effectiveness.

Control of payloads, even when obfuscated.
Trackwatch® conducts protocol and static analysis on packets to compare them to signatures of known attacks provided by multiple Threat Intelligence sources. Trackwatch® can also accommodate new sources. The solution ensures detection of shellcodes (including polymorphic) and all encoded payloads.

Research and anticipation of vulnerability exploits
The SOC experts have access to the entirety of data and metadata from the analysis of network communications. They can pivot intuitively during the handling of a security incident or their proactive intrusion research, thus shortening the remediation time.

Resilient software platform against cyber attacks
Developed with a ‘Secure by Design’ approach, Trackwatch® features a hardened OS that provides strong resistance to corruption attempts and reduces the attack surface
Certifications




