Continuous analysis of network flows

TEHTRIS NETWORK TRAFFIC ANALYSIS detects network intrusions with signatures and flow analysis. In addition, network forensics operations can be initiated by looking at metadata, such as Netflow. Finally, passive audits are performed on a continual basis to detect vulnerabilities.

TEHTRIS NTA is connected by the client to a mirroring port or TAP box where network flows can be analyzed. The TEHTRIS NTA VM can thus analyze the related flows in order to provide cybersurveillance services at the network layer.

The list of flows to be studied as well as the IP addresses to follow are shared with TEHTRIS to optimize the settings during the remote deployment.

Pictogramme alarme blanc

Network intrusion detection with signatures

Pictogramme SNIF blanc

Network forensics through metadata of recorded flows

Pictogramme bouclier blanc

Passive security checks to detect vulnerabilities


  • Appliance on-premise
  • Automatic signature updates
  • Identification of abnormal peaks in network activity
  • Network forensics against  flows in order to know who spoke to whom, when, how
  • Identification of vulnerabilities within collected network flows without the need to scan or attack targets

Compliant with GDPR regulations

Since its creation, TEHTRIS has taken into account the protection of all data processed in order to ensure the security of the information systems that it is entrusted to.  This is not only from the time of development but also each time the TEHTRIS XDR Platform is improved. Security and privacy by design measures are used for each step of the data processing, from the collection of data in your infrastructure to its destruction on our Appliances.
TEHTRIS applies the same principles of security and privacy by design in each of its solutions in order to protect the integrity, confidentiality and authenticity of your data.