Breach Detection System and Smart Probes

Our unique technology detects the most advanced threats, made with the most crafted exploitation methods (polymorphism, obfuscation, encoding, ROPchain…) and the threats based on all types of malicious files (ransomware, cryptolocker…).

The must-have tool for your protection, with unmatched capabilities

Trackwatch®, the detection system published by Gatewatcher, is based on a unique technology in weak signal analysis and machine learning, targeting abnormal behaviours by running a dynamic analysis of weak signals from inside network flows. Trackwatch® is the only product on the market with a dual approach to the threat in the exploration phase, with deep data capture and optimal analysis. It auto-adapts to polymorphic threats, in order to guarantee a strong accuracy.

PAYLOADS


SIGFLOW: formal and statistical analysis, anomaly detection.
CODEBREAKER: recognises APTs stemming from encoded Shellcodes / ROP (Return Oriented Programming) and JOP (Jump Oriented Programming)

MALWARE


MALCORE: real-time heuristic and static multi-engine malware analysis. Malcore is able to analyse more than 6 million files every 24 hours.
RETROACT: enables the empirical re-analysis of potentially malicious files, several days after their appearance, with new signatures and heuristic methods.

Get in touch with our team and ask for a free demo!

Information Capture and Analysis

At the very heart of your information system, Trackwatch® is the only product on the market with a double approach in innovation: deep information capture and optimal analysis.

A turney solution

  • Adapted to run online connected to our smart system
  • Adapted to run fully offline for isolated and confidential networks
  • Your information belongs to you. No “Cloud” technology.
  • 0 impact on your production environment: connects with TAP or port mirroring

ElasticSearch, Metadata et Forensics

  • Intuitive and ergonomic
  • “Network Behaviour” approach (visualisation of activity spikes, behavioural deviation, statistics, etc)
  • Integration of geolocation with interactive map
  • Decrease of false positives and recurring alerts
  • Management of alert severity / criticality

Operating modes

Online mode: connected to our online platform. Suited for organizations wishing to decrease their administration and management load.

Air gap mode: for confidential and isolated networks and those with no access to the outside. Optimal to be paired up with a proxy (Bluecoat, Squid, Websense).

Offline mode: download updates and upgrades on devices for confidential and isolated networks.

This website uses cookies to ensure you get the best experience on our website. Learn more.