About Us
About us - Why Choose Us?
Our mission is to deliver analytics solutions that will help businesses realize their intrusion prevention goal
Only IntrusionPoint has built a technology platform capable of helping users maximize their NGFW/IPS deployment goals.
Founded by distinguished architects and engineers from security and networking leaders like Cisco and IBM, our team is the strongest. We are adding value by providing valuable insights on the tools used to monitor intrusion on business networks; and are solving some of the most advanced information security challenges today, from on-premises through cloud security to online threats to data governance. We have a patent to our name, with dozens more in process. In order to stay at the top of our game, our only choice is to be innovative, creative and dream big every day.
IntrusionPoint is a flexible “Business Case Analysis Tool” that decodes and analyzes the underlying technical, functional, component and solution characteristics of each product type specifying their suitability for deployment in a particular environment; and offers CIOs, CISOs, security engineers, enterprise network system operators, and NGFW/IPS product developers a comprehensive analysis of the requirements, and operational details for the effective implementation of each industry leading product type.
IntrusionPoint was developed on four key tenets — these remain true today
Data Points AnalyzedMore than 3000 data points analyzed. IntrusionPoint provides in visual and descriptive terms the underlying technical and business architecture of all leading vendor products.
Developed through extensive industry experience with actual network deployments, the IntrusionPoint™ tool has the flexibility to model a variety of deployment plans and service models. IntrusionPoint™ has been designed to allow users of NGFW/IPS products to customize a business case analysis for any deployment and target environment or market.
The tool accepts a wide range of market data, technical parameters, and business/financial and service planning inputs that a user can tailor for their particular deployment plan.
It simulates a network deployment and operations using a variety of technical, environmental and service plans and produces a detailed analytical report, analytics output graphs, and key technical, deployment and implementation metrics.

Our Our Mission
Our mission is to deliver analytics solutions that will help businesses realize their intrusion prevention goal
About us - inner banner
Our Services

Threat modeling is an activity that approaches the design of the software from an adversary’s perspective, which includes identifying the pathways that can be used to conduct an attack. The goal of threat modeling is to enumerate potential threats to an application and map each threat to a corresponding mitigation.

Code review is the process of auditing the source code of an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places. Our comprehensive approach utilizes automated static analysis to ensure full code coverage and manual review for intensive inspection of security critical areas of the code.

Threat modeling is an activity that approaches the design of the software from an adversary’s perspective, which includes identifying the pathways that can be used to conduct an attack. The goal of threat modeling is to enumerate potential threats to an application and map each threat to a corresponding mitigation.