For VendorsBlog
Group-IB TDS — Threat Detection System

Group-IB TDS — Threat Detection System

Intelligence driven Advanced threat detection Notifies you of security threats, malware and breaches inside your network to prevent intrusions, attacks, data leaks, and espionage

Features of product

Проблемы Problem Solving
  • No IT security guidelines
  • Unauthorized access to corporate IT systems and data
  • Malware infection via Internet, email, storage devices
  • Risk of attacks by hackers
Ценности Business Values
  • Ensure Security and Business Continuity

About Product

Meeting key information security challenges

  • Detection of complex targeted attacks at an early stage
  • Prevention of financial and reputation loss
  • Protection of internal networks, email, and file storage systems
  • Optimisation of security processes and costs

High level of protection guaranteed

In-depth understanding of threats

Extensive insight thanks to data contained in Group-IB’s proprietary Threat Intelligence system, deemed among the best in its class by top agencies such as Gartner, IDC and Forrester

Hands-on experience in incident response

Our experience in responding to incidents and investigating cyber crimes helps us be the first to detect the use of new tools

Modern technologies

File behaviour analysis, unique signatures, detection of network anomalies through machine learning

Detection of attacker infrastructure on a global scale

Technology conceived to collect a large amount of data and unique search algorithms designed to find connections help detect infrastructure that hackers intend to use in future attacks

TDS modules

Managed detection & response 24/7


  • Alerts monitoring
  • Anomaly analysis
  • Threat Hunting
  • Remote response
  • Incident management
  • Critical threats analysis

Detecting infrastructure management & data analysis

TDS Huntbox

  • Internal Threat Hunting
  • Retrospective analysis
  • Modules management
  • Single interface
  • External Threat Hunting
  • Correlation & attribution
  • Data storage
  • Events analysis

Attacks detection & prevention

TDS Sensor

  • Traffic analysis
  • Files extraction
  • Anomalies detection

TDS Polygon

  • Isolated environment
  • Files analysis
  • Links analysis

TDS Endpoint

  • Events logging
  • Response at hosts
  • Threats detection

Features of users

Используют так же Also use
  • SIEM - Security Information and Event Management