top of page
PinCat  Security  System

Analyzing

Understanding

Protecting

Analyzing​​

Every person behavior in network is unique. ​​

Each network should be monitored to understand what shall be allowed or blocked to pass.​​

PSS captures customary activity of the network.​​

Understanding 

PinCat Private Intelligence creates unique user fingerprint.

We called it NetPass 

Using NetPass PinCat Private Intelligence adapts special protection tools for the user.

Protection 

We believe that the best protection is the one you don't need to configure. 

Leveraging NetPass insights, proactive defenses secure the network by adapting to threats in real-time.

Blocking malicious activities while ensuring legitimate traffic flows.

Neural Network

It's always easy to fight against a common enemy. Any PSS-powered router connected to the internet is part of the guard for your network.
If there is an attack on one of the guards at a single point on the planet, all other PSS-powered routers will know about it at once¹, and the attack is no longer a zero-day.

Zero Day Ready

Even the first guard is not abandoned. The new type of threat will be analyzed more like a human would². PPI is a battle-hardened system and it's power increases with every attack it withstands.

Fewer Configuration

Once PSS is installed on any supported platform, PPI analyzes traffic for 14 days to understand what is normal for your network. Then, PPI configures PSS defenses specifically for your network. Of course, you can manually compose rules if needed.

Number of hosts

Logging/managment

PPI analyzing

Protection layers

Neural Network Connection

Protection line

DDOS protection

Main protection

skills from

Core

10

check list.png
x.png

3, 4

2 times per day

Only input traffic

200Mb/s and provider bandwidth

Elementary port scanners,

elementary brute forces, elementary injections

Enhanced

25

check list.png
check list.png

3, 4, 5

24/7

Input and output traffic

10Gb/s and provider bandwidth

Advanced port scanners, advanced brute forces, injections, virus traffics,

bad networks

Advanced

255

check list.png
check list.png

2, 3, 4, 5, 6

24/7

Input and output traffic

40Gb/s and provider bandwidth

Advanced port scanners, advanced brute forces, injections, virus traffics, bad networks, zero day attacks, spy programs

Enterprise

4095

check list.png
check list.png

2, 3, 4, 5, 6, 7

24/7

Input and output traffic

100Gb/s and provider bandwidth

Advanced port scanners, advanced brute forces, injections, virus traffics, bad networks, zero day attacks, spy programs

bottom of page