Positive Technologies
Protecting business and government from non-tolerable events using the latest technology

Product Overview
All Positive Technologies solutions are designed with industry-specific knowledge of how to protect business and a firm grasp of regulatory requirements. PT has extensive experience in protecting businesses in various sectors of the economy. PT creates corporate, industry, and national cybersecurity centers based on our own products and solutions.
- MaxPatrol VM
- MaxPatrol SIEM
- PT Application Inspector
- PT BlackBox
- PT NAD
Next-generation vulnerability management system
MaxPatrol VM is a next-generation vulnerability management system. The solution allows you to build a full-fledged vulnerability management process and control it during both routine operation and urgent scanning. With MaxPatrol VM you can:
MaxPatrol VM is a next-generation vulnerability management system. The solution allows you to build a full-fledged vulnerability management process and control it during both routine operation and urgent scanning. With MaxPatrol VM you can:
- Get complete and continuously updated data on the IT infrastructure.
- Control vulnerability elimination.
- Monitor the company’s overall security level.
- Factor in the significance of protected assets.
- Identify, prioritize, and set vulnerability processing rules for the IT department.
An advanced solution that knows your infrastructure and delivers pinpoint detection
- MaxPatrol SIEM provides 360º visibility into infrastructure and detects security incidents. The solution is regularly updated with knowledge from Positive Technologies experts, and effortlessly adapts to network changes. Detects the important threats : MaxPatrol SIEM "gets smarter" all the time thanks to expertise packs supplied by the Knowledge Base component, helping users to detect attacker tactics, techniques, and procedures before serious consequences happen.
- Reduces the burden on in-house experts : Rules included in expertise packs do not require painstaking adjustments and are ready to use after simple configuration.
- Gives 360º visibility into infrastructure : IT infrastructure becomes transparent to security staff: with inventory technology from the MaxPatrol vulnerability and compliance management system, MaxPatrol SIEM fully enumerates assets and security gaps. Data is collected actively and passively from over 300 types of systems.
The only source code analyzer that provides high-quality analysis and convenient tools to automatically confirm vulnerabilities
PT Application Inspector is the right choice for applications of any size and industry. A unique combination of scanning methods—static application security testing (SAST), dynamic application security testing (DAST), interactive application security testing (IAST), software composition analysis (SCA), plus fingerprint and pattern matching— guarantees accurate results to defend applications everywhere from landing pages to corporate portals, online stores, banking apps, cloud services, and e-government portals.
PT Application Inspector is the right choice for applications of any size and industry. A unique combination of scanning methods—static application security testing (SAST), dynamic application security testing (DAST), interactive application security testing (IAST), software composition analysis (SCA), plus fingerprint and pattern matching— guarantees accurate results to defend applications everywhere from landing pages to corporate portals, online stores, banking apps, cloud services, and e-government portals.
- High-quality analysis
- Rapid remediation
- Flexible workflow integration
- Real-time protection Regulatory and standards compliance
Dynamic application security testing tool
Positive Technologies: making the internet safer, one application at a time Our PT BlackBox product family includes PT BlackBox Scanner, a free cloud-based scanning tool for websites. It enables web application owners to find vulnerabilities and get a list of recommended remediation measures. PT BlackBox Scanner is available in two versions, with or without user registration.
Positive Technologies: making the internet safer, one application at a time Our PT BlackBox product family includes PT BlackBox Scanner, a free cloud-based scanning tool for websites. It enables web application owners to find vulnerabilities and get a list of recommended remediation measures. PT BlackBox Scanner is available in two versions, with or without user registration.
- Lowers resource consumption by recognizing and skipping duplicate pages.
- Uncovers hidden threats using a combination of signature and heuristic analysis. Continuously updates information on vulnerabilities.
- Can be integrated into the development and release cycle for efficient vulnerability detection and remediation.
- Users can customize analysis parameters, including authorization settings, and add scanning profiles.
Make hidden threats visible
PT Network Attack Discovery is a network detection and response (NDR/NTA) system for detecting attacks on the perimeter and inside your network. The system makes hidden threats visible, detects suspicious activity even in encrypted traffic, and helps investigate incidents.
PT Network Attack Discovery is a network detection and response (NDR/NTA) system for detecting attacks on the perimeter and inside your network. The system makes hidden threats visible, detects suspicious activity even in encrypted traffic, and helps investigate incidents.
- Provides network visibility : PT NAD identifies over 85 protocols and parses the 30 most common ones up to and including L7. Get a full picture of what is going on in the infrastructure to identify security flaws that enable attacks.
- Detects hidden threats : The system automatically detects attacker attempts to penetrate the network and identifies hacker presence on infrastructure based on a wide range of indicators, including use of hacker tools and transmission of data to attacker servers.
- Makes SOCs more effective : PT NAD provides security operations centers with full network visibility so you can see whether an attack was successful, reconstruct the kill chain, and gather evidence. To do this, PT NAD stores metadata and raw traffic, helps quickly find sessions and identify suspicious ones, and supports traffic export and import.
Cloud Security Cloud Compliance Cloud IAM
Target Industries
Government
Telecoms
Oil & Gas
Hospitality
Financial
Education
Positive Technologies Distribution Team
If you are interested in Positive Technologies products and solutions, or would like to find out more, contact our Positive Technologies distribution team