We monitor networks for a broad range of security issues, tailoring our monitoring for the specific industry and requirements of each customer.
We monitor for hacking including reconnaissance, network and application exploits as well as lateral movement.
We use methods including machine learning to detect malicious executables, command and control activity as well as network propagation.
We monitor for weaknesses in technology systems and business processes that may be used to steal data and commit fraud.
We monitor logins, authorisation changes, access reach, electronic communications and data transfers to detect insider threats.
Devices are continuously monitored by our cloud service and protective controls are applied wherever your devices are located, whether that be in the office or on public Wifi.
We provide extensive functionality that our customers can use to secure their environments and all functionality is provided as part of a single license.
ThreatSpike delivers deep insight into activity on the network:
ThreatSpike can be used to protect against data leakage:
Web browsing can be restricted to ensure compliance with corporate policies.
Information about devices is collected and presented through dashboards and reports, including:
Access to internal systems on the network can be restricted to increase security and mitigate worm propagation.
ThreatSpike is the first company to offer a fixed cost pricing model for both defensive and offensive security services.
We provide monitoring services to companies ranging from 10 to 100,000 users spanning 15 industries and 50 countries.
"ThreatSpike offers a strong value proposition that ties in to our business needs. Our experience with ThreatSpike is extremely positive. Like us, it is a dynamic, entrepreneurial organisation and quick to respond to our changing requirements."
"ThreatSpike analysts provide us with assurance that our network and customer data is constantly protected and that when a threat is detected, that it is dealt with quickly."
ThreatSpike protects customers and devices all across the world each day. With such breadth comes the ability to identify threats as they are arising and develop more capable and accurate algorithms.
Average number of issues discovered during trials
Billion events analysed per day
TB of network traffic analysed per day