Group-IB TDS — Threat Detection System

Problems that solves

No IT security guidelines

Unauthorized access to corporate IT systems and data

Malware infection via Internet, email, storage devices

Risk of attacks by hackers


Ensure Security and Business Continuity

Group-IB TDS — Threat Detection System

Intelligence driven Advanced threat detection Notifies you of security threats, malware and breaches inside your network to prevent intrusions, attacks, data leaks, and espionage


Meeting key information security challenges
  • Detection of complex targeted attacks at an early stage
  • Prevention of financial and reputation loss
  • Protection of internal networks, email, and file storage systems
  • Optimisation of security processes and costs
High level of protection guaranteed In-depth understanding of threats Extensive insight thanks to data contained in Group-IB’s proprietary Threat Intelligence system, deemed among the best in its class by top agencies such as Gartner, IDC and Forrester Hands-on experience in incident response Our experience in responding to incidents and investigating cyber crimes helps us be the first to detect the use of new tools Modern technologies File behaviour analysis, unique signatures, detection of network anomalies through machine learning Detection of attacker infrastructure on a global scale Technology conceived to collect a large amount of data and unique search algorithms designed to find connections help detect infrastructure that hackers intend to use in future attacks TDS modules Managed detection & response 24/7 CERT-GIB
  • Alerts monitoring
  • Anomaly analysis
  • Threat Hunting
  • Remote response
  • Incident management
  • Critical threats analysis
Detecting infrastructure management & data analysis TDS Huntbox
  • Internal Threat Hunting
  • Retrospective analysis
  • Modules management
  • Single interface
  • External Threat Hunting
  • Correlation & attribution
  • Data storage
  • Events analysis
Attacks detection & prevention TDS Sensor
  • Traffic analysis
  • Files extraction
  • Anomalies detection
TDS Polygon
  • Isolated environment
  • Files analysis
  • Links analysis
TDS Endpoint
  • Events logging
  • Response at hosts
  • Threats detection