Trackwatch
What our customers praise
Your benefits
Trackwatch® enables the detection of concealed threats through their analysis using a combination of detection engines (static, heuristic, Machine Learning). This approach allows for rapid qualification and remediation by SOC experts who have access to the complete set of metadata.
Based on a wide range of hardware, Trackwatch® can operate in connected mode or completely offline for restricted and confidential networks. You retain control of your information. Its position in bypass (TAP) ensures no impact on your production environment.
Trackwatch® detects all types of malware through file analysis conducted by multiple anti-virus engines. The platform can examine up to 6 million files per 24 hours and retro-analyze files flagged as suspicious after their passage.
The features
Threat prioritisation
Alerts are aggregated, allowing rapid triage against an evolving risk score, which is linked directly to your IS. This approach accelerates decision-making by SOC experts, expediting effectiveness.
Flexible interconnection with your ecosystem
Through specific developments based on APIs and standardised connectors (EDR, XDR, SIEM, SOAR, NextGen Firewall), Trackwatch® facilitates seamless integration with your ecosystem.
Resilient software platform against cyber attacks
Developed with a ‘Secure by Design’ approach, Trackwatch® features a hardened OS that provides strong resistance to corruption attempts and reduces the attack surface
Control of payloads, even when obfuscated.
Trackwatch® conducts protocol and static analysis on packets to compare them to signatures of known attacks provided by multiple Threat Intelligence sources. Trackwatch® can also accommodate new sources. The solution ensures detection of shellcodes (including polymorphic) and all encoded payloads.
Research and anticipation of vulnerability exploits
The SOC experts have access to the entirety of data and metadata from the analysis of network communications. They can pivot intuitively during the handling of a security incident or their proactive intrusion research, thus shortening the remediation time.