TEHTRIS XDR PLATFORM

The XDR infrastructure brings together several security solutions within a single coherent platform, capable of detecting and responding to security incidents.

eXtended Detection & Response

TEHTRIS XDR Platform meets multiple key needs. It uses its network of efficient sensors, such as TEHTRIS EDR components, to improve protection, detection and response capabilities against an attack on the network where it is positioned. With the TEHTRIS XDR Platform, you’ll be ready to face the unpredictable.

TEHTRIS XDR Platform is centrally configurable, with an intuitive system to build its own decision trees on what to do in the event of an attack.

Having a centralized, holistic view in the unified console of the TEHTRIS XDR Platform allows cyber security analysts to mix and match different views without ever being blindsided.

The unification of the components of the TEHTRIS XDR Platform is also done through numerous TEHTRIS bricks, such as EDR, EPP, SIEM, NTA, Honeypots, etc. Dynamic sharing between components is possible thanks to relationships between products, with automation via the integrated SOAR, and requests related to technical intelligence to TEHTRIS CTI (Cyber Threat Intelligence).

Your cybersecurity services finally get technical certifications

1 of 4

Effectively increase your cybersecurity productivity in the face of incidents

2 of 4

A powerful portfolio of cybersecurity solutions against sabotage or espionage

3 of 4

Complete integration in all your local and remote instances

4 of 4

Your cybersecurity services finally get technical certifications

1 of 4

Effectively increase your cybersecurity productivity in the face of incidents

2 of 4

A powerful portfolio of cybersecurity solutions against sabotage or espionage

3 of 4

Complete integration in all your local and remote instances

4 of 4

Latest Updates

WHY tehtris XDR?

SIMPLICITY

On a functional level, the TEHTRIS XDR Platform looks like a technical mix between a future SIEM and a SOAR, cept that our XDR platform integrates within a few hours/days, compared to a few weeks/months for rather heavy SIEM and SOAR solutions.

TRACEABILITY

Without operational SIEM on the cybersecurity side or logging limitations, many companies can switch to TEHTRIS XDR which provides detection and response to attacks and actual regulatory traceability with TEHTRIS SIEM.

ARTIFICIAL INTELLIGENCE

In machine learning mode, the monitoring of TEHTRIS’s XDR components enables the recognition of abnormal behaviors, which simplifies hunting in large, heterogeneous and distributed infrastructures.

HYPERAUTOMATION

TEHTRIS XDR ensures both detection and response, distinguishing between a legitimate action and a threat, around a technical unification via an integrated SOAR, which uses the captured surveillance information to be able to react to an attack, for example by neutralizing a threat, or by providing useful information to analysts.

RELIABILITY

By 2013, TEHTRIS already had an EDR agent, along with SIEM, NTA and honeypot solutions, coded internally within TEHTRIS, and natively integrated into a technical platform called eGambit, which became the basis of the TEHTRIS XDR Platform we have today.

LEGITIMACY

Since 2013, TEHTRIS has built cybersecurity engines in reference to more than fifteen years of research work on active digital security, giving rise to disruptive techniques, integrated into the TEHTRIS XDR Platform.

TEHTRIS SOAR

Security Orchestration, Automation and Response

When it comes to  cybersecurity, the ability to orchestrate a quick and efficient response to cyber events is a fundamental issue. One of the best ways to achieve this is to use particularly powerful automation and artificial intelligence. This is what TEHTRIS offers you with its SOAR integrated to the TEHTRIS XDR Platform.

Discover our way to create hyper automation!

TEHTRIS EDR

Innovative protection technology through smart automated active defense

TEHTRIS SIEM

Optimized centralization and sophisticated correlations on events and security logs

TEHTRIS EPP

Ultra-complete low-level system protection with antiphishing antivirus & firewall

TEHTRIS DECEPTIVE RESPONSE

Honeypots simulating fake devices and fake services to deceive attackers

TEHTRIS NTA

Network probe analyzing flows in real-time with signatures, vulnerability audits & forensics

TEHTRIS MTD

Tactical agent for mobile infrastructures with security policies and threat scanners

TEHTRIS DNS FW

Security solution that eliminates and monitors all internal and external DNS-related malware

TEHTRIS ZTR

Zero-Trust Security Solution with Automatic Incident Response

compliance with Mitre Att&ck

MITRE ATT&CK is a knowledge base with a modeling of the behavior of a cyberattacker, illustrating all phases of a cyberattack’s life cycle in relation to targeted platforms: Windows, macOS, Linux, mobile devices and so on.

Find out how TEHTRIS is compliant with MITRE ATT&CK

© 2020 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

SOME FIGURES

999 day

to deploy TEHTRIS XDR Platform for a company with more than 100,000 stations and servers

+ 0 countries

where TEHTRIS XDR Platform has been deployed worldwide in detection and incident response mode

999 days

to uncover some of the APT threats of the stealth espionage type that have been hidden in a complex international information system for several years

XDR NEWS

Uncovering Attackers and Anomalies Faster with Data-led Cybersecurity

Uncovering Attackers and Anomalies Faster with Data-led Cybersecurity Organizations are now facing an increasing set of cyberattacks from various places. Cybercriminals don’t just cost a business hard-earned cash, but they can also ruin its reputation, causing distrust in their existing, past, and potential customers. Cybersecurity experts are constantly trying to

More information

Can we dream of a fully automated XDR Platform? Yes, we can!

Can we dream of a fully automated XDR Platform? Yes, we can! XDR platforms are our response to the increasing sophistication of the tools and tactics cyber attackers use, that render anti-virus programs and other traditional cybersecurity solutions helpless. XDR makes a case for a more holistic cybersecurity approach that

More information