top of page

Networks and Communication

  • User behaviour analysis and prediction

  • Low footprint high performance signature engines

  • Packet based anomaly detection

  • Flow based anomaly detection

  • DDoS detection and mitigation L3/4+L/7

  • Process/service scale out and scale down algorithms based on multiple criteria

  • Anomaly detection (low to no false positive rates) on operational time series

  • Automatic correlation among event in time series

  • Fraud detection

  • Attack detection and mitigation

  • Low signal to noise ratio analysis

  • Statistical Inference and Predictive Analytics

  • Process Mining

  • Forensics

  • Identity graphs

bottom of page