top of page
Networks and Communication
-
User behaviour analysis and prediction
-
Low footprint high performance signature engines
-
Packet based anomaly detection
-
Flow based anomaly detection
-
DDoS detection and mitigation L3/4+L/7
-
Process/service scale out and scale down algorithms based on multiple criteria
-
Anomaly detection (low to no false positive rates) on operational time series
-
Automatic correlation among event in time series
-
Fraud detection
-
Attack detection and mitigation
-
Low signal to noise ratio analysis
-
Statistical Inference and Predictive Analytics
-
Process Mining
-
Forensics
-
Identity graphs
bottom of page