BEC (Business Email Compromise)

The BEC fraud is a scam specifically targeting companies. The criminals pretend to be part of the structure or in partnership (as a team member, a subcontractor…) and target employees with access to financial data (CFO, accountant…). They encourage them to make transfers to apparently reliable accounts (they are not). The techniques vary: identity theft (or spoofing), spear phishing, malware…


A blockchain is a technology dedicated to the storage and the transmission of information. It can be viewed as a book that allows data to be directly shared, stored and exchanged on the Internet. The entire database is public and all exchanges made between users since its creation can be consulted. If someone tries to falsify information, the chain is broken.


Phishing is a scamming technique used by hackers to obtain personal or professional information by pretending to be a trusted third party.


Forensic data analysis consists in investigating an information system after a cyberattack. Analysts will collect all the raw data (deleted files, hard drives, backups, system logs…), study them to understand what happened and draw conclusions. This task, which is sometimes arduous, makes it possible to produce the evidence necessary for internal action or for legal proceedings, for example.

MDR (Managed Detection & Response)

An MDR (for Managed Detection and Response), is an external service offering that organizations can access through their MSSP (Managed Security Service Provider) partner. MDR provides them with continuous protection for their information systems, via uninterrupted monitoring managed by dedicated cybersecurity experts. This offering typically includes detection, analysis, investigation and response.

Open XDR

The Open XDR concept is an evolution of the XDR (eXtended Detection & Response) platform by enabling the direct linkage to developed and marketed cybersecurity solutions from different vendors.

EPP (Endpoint Protection Platform)

An EPP is an endpoint security solution that comes from the next-generation antivirus world. Such an agent is capable of preventing many attacks like file-based malware attacks and malicious activities, with specific features against many security issues like phishing, exploitation/0-days and network attacks.

NIDS (Network Intrusion Detection System)

NIDS or Network Intrusion Detection System are solutions that analyze traffic and try to find unusual activities, like scanning, intrusion attempts, lateral movements, exfiltration, backdoors, command and control, etc.

This was initially done through signatures, but over time some solutions evolved to NTA. TEHTRIS NTA includes NIDS features with more than 50,000 regularly updated rules.

MTD (Mobile Threat Defense)

Mobile Threat Defense or Mobile Threat Defense (MTD) is a dynamic and sophisticated protection against cyber threats targeting mobile devices. With an MTD, protection is applied to devices, networks and applications.

CTI (Cyber Threat Intelligence)

CTI is based on multiple kinds of sources like open source intelligence, social media intelligence, human intelligence, technical intelligence or even intelligence taken out of the deep or dark web.

Cyber or not cyber ?

Once a month, receive the essential news and cyber watch by subscribing to the TEHTRIS newsletter.