Bidirectional flow analysis technology
Data traffic parsing
Identification of red team toolkits
Real-world attack and defense perations detection rules
AI-powered behavioral detection model for red team activities
Upgraded algorithms for detecting 0day exploits, polymorphic attacks, and APTs
Recognition of common lateral movement techniques
Detects encrypted reverse shells, ICMP/DNS/HTTP covert tunnels, and encrypted tool-based intrusions
Pinpoints attacks targeting VMware vCenter, ESXi, and other hypervisors
Dynamic-static hybrid analysis for viruses, Trojans, hacker tools, rootkits, and cryptominers
End-to-end detection aligned with attack lifecycle stages
Multi-algorithm approach (static + dynamic)
Deep inspection of malicious code patterns
Built-in threat intelligence engine
Real-time updates with global threat feeds
Covers threat intelligence, threat logs, metadata, threat PCAP packets, and full-traffic data storage.
Automated aggregation analysis from attacker, victim, and threat event perspectives to improve efficiency and reduce noise.
Leverages knowledge graph technology to visually map attack chains.
Security Risk Operation
"Intelligence Officer"
Advanced Threat Detection & Response
"Commander"
Smart Traceability Investigation
"Analyst"
Compliance with Multi-level Protection
Scheme (MLPS) 2.0