บริษัท เทคทาเล้นท์ จำกัด เป็นบริษัทที่ให้บริการงานด้าน ICT เป็นหลัก ประกอบด้วยอุปกรณ์ระบบเครือข่ายระบบซอฟต์แวร์ สนับสนุนงานบริหารจัดการในองค์กร ตามความต้องการลูกค้า

Gallery

Contacts

299/173 Vibhavadi Rangsit Rd, Talat Bang Khen, Lak Si, Bangkok 10210

service@techtalent.co.th

+66 90 905 7625

AIONIQ Network Detection and Response

Gatewatcher is the editor of the AIONIQ® advanced threat and intrusion detection system.

Gatewatcher provides its customers with rapid detection and critical analysis of any intrusion attempt, especially the stealthiest. The detection technologies developed by Gatewatcher, the architecture of its AIONIQ solution and the partnerships established over several years have ensured the successful development of the company and its reputation in the market.

Gatewatcher brings together teams of experts and enthusiasts, with a high level of competence and commitment, always more motivated by technical challenges and by the development of the AIONIQ solution to constantly improve its performance and its quality.

In April 2019, following a major audit, the ANSSI (French National Agency for Information Systems Security) announced the qualification of Gatewatcher’s threat detection probe, which officially received the agency’s security visa after ruggedness and confidentiality tests.

This qualification is in line with the 2015 french military planning act, which certifies threat detection probe products and services for french Critical Service Operators (OIVs).

Certifications and Recognitions

anssi
ANSSI

(French National Agency for Information Systems Security)

bsi-300x148
BSI

German Federal Office for Information Security

Computing Security Awards

Advanced Persistent Threat (APT) Solution of the Year 2022 “One to Watch” Security – Product

Gartner

Selected as a “Full Fledged Network Detection and Response” solution.

Gartner's definition of 360 degrees SOC visbility triad

A combination of machine learning (ML), advanced analytics and rule-based detection to detect anomalous and suspicious activity on enterprise networks.

AionIQ NDR Features

TRACKWATCH is an innovative Breach Detection System (BDS) platform. It is a natural evolution of the IDS (Intrusion Detection System). Solution developed in France and meeting the hardening requirements issued by ANSSI for the application of the Military Programming Law, TRACKWATCH effectively protects organizations against digital intrusions. It is a next-generation intrusion detection solution based on innovative technologies responding to the latest and most sophisticated attack methods.

The TRACKWATCH platform consists of two appliances:

  • A central appliance, called GCenter, which receives the information sent by the probes, and which uses TRACKWATCH technology to detect and analyze the “killchain”,

  • One or more probes, called GCap, which listen to the traffic on which they are placed.

GCap capture probe is strategically installed on a particular site. This probe will be responsible for capturing, reconstructing, sorting and transmitting files, codes and events to the GCenter management server. Regarding the confidentiality of the latter, no captured data is transmitted to the outside, its optimization adapts to restricted environments. The deployment mode of the solution is done in bypass from a TAP (aggregator or not) or port mirror (SPAN) if outside LPM.

Overall Operation

The GCap ensures the capture of network flows and part of the analyses. A GCap is connected to a switch with a port mirror or to a TAP mirroring the network flow. One or more GCap can be deployed within an infrastructure, locally or at remote sites. The GCap are connected to a GCenter management appliance.

The GCenter ensures the analysis of the information reported by the GCap, their storage, the interfaces for configuration, reporting and the export of information to a SIEM. Probe or Probe-related components will be deployed within the Customer Network, Customer Admin Network, Enclave, or Probe Service Information System. The authorization of data escalation to the detection service is under the exclusive control of the client.