About Us

About us - Why Choose Us?

We're a Cyber security and intrusion prevention product analytics company
Our Mission

Our mission is to deliver analytics solutions that will help businesses realize their intrusion prevention goal

Why Choose Us?

Only IntrusionPoint has built a technology platform capable of helping users maximize their NGFW/IPS deployment goals.

Founded by distinguished architects and engineers from security and networking leaders like Cisco and IBM, our team is the strongest. We are adding value by providing valuable insights on the tools used to monitor intrusion on business networks; and are solving some of the most advanced information security challenges today, from on-premises through cloud security to online threats to data governance. We have a patent to our name, with dozens more in process. In order to stay at the top of our game, our only choice is to be innovative, creative and dream big every day.

Business Case Analysis Tools

IntrusionPoint is a flexible “Business Case Analysis Tool” that decodes and analyzes the underlying technical, functional, component and solution characteristics of each product type specifying their suitability for deployment in a particular environment; and offers CIOs, CISOs, security engineers, enterprise network system operators, and NGFW/IPS product developers a comprehensive analysis of the requirements, and operational details for the effective implementation of each industry leading product type.

IntrusionPoint was developed on four key tenets — these remain true today

Data Points Analyzed

More than 3000 data points analyzed. IntrusionPoint provides in visual and descriptive terms the underlying technical and business architecture of all leading vendor products.

Flexible & Customizable

Developed through extensive industry experience with actual network deployments, the IntrusionPoint™ tool has the flexibility to model a variety of deployment plans and service models. IntrusionPoint™ has been designed to allow users of NGFW/IPS products to customize a business case analysis for any deployment and target environment or market.

Rich Source Data

The tool accepts a wide range of market data, technical parameters, and business/financial and service planning inputs that a user can tailor for their particular deployment plan.

Simulation

It simulates a network deployment and operations using a variety of technical, environmental and service plans and produces a detailed analytical report, analytics output graphs, and key technical, deployment and implementation metrics.

why choose us

Our Our Mission

Our mission is to deliver analytics solutions that will help businesses realize their intrusion prevention goal

About us - inner banner

We're a Cyber security and intrusion prevention product analytics company

Our Services

Threat Modeling

Threat modeling is an activity that approaches the design of the software from an adversary’s perspective, which includes identifying the pathways that can be used to conduct an attack. The goal of threat modeling is to enumerate potential threats to an application and map each threat to a corresponding mitigation.

Code Review

Code review is the process of auditing the source code of an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places. Our comprehensive approach utilizes automated static analysis to ensure full code coverage and manual review for intensive inspection of security critical areas of the code.

Threat Modeling

Threat modeling is an activity that approaches the design of the software from an adversary’s perspective, which includes identifying the pathways that can be used to conduct an attack. The goal of threat modeling is to enumerate potential threats to an application and map each threat to a corresponding mitigation.