Artificial Intelligence in Enterprise Network Security

Detection of Unknown Security Threats

Threat Intelligence employs tens of newly researched detection algorithms based on advanced mathematics that has never been used before in cyber security. This makes it particularly effective in detection of unknown attacks such as zero-day worms, trojans, botnets as well as internal attacks, unauthorized access and other types of attack that might come in the future.

Machine Learning Saves Time

Unlike most anomaly detection and network behavior analysis systems Threat Intelligence is not dependent on manually set rules. Instead, its advanced machine learning automatically generates self-adapting rules relevant for a particular network. This makes Threat Intelligence extremely easy to deploy, maintain and work with.

Faster Incident Response

By detecting atomic symptoms of malicious behavior and anomalies in network traffic it identifies cyber attacks in a very early stage, decreases incident response time and prevents further damage. Thereby, it helps to decrease overall cyber security risks.

Detailed Network Monitoring

TrustPort Threat Intelligence offers an overview of the monitored network so that it is elementary to understand who and how uses individual network elements, bandwidth and other resources as requests, services, and how they are interconnected.

Main Advantages of Threat Intelligence

The first protocol for attack detection that goes far beyond NetFlow or packet inspection, the most modern machine learning, fast data mining... There are tens of innovations used in Threat Intelligence. Why? Because that makes it an excellent security solution.

New Technology, Without a Parallel on the Market

Threat Intelligence utilizes synergies among several detection engines. The main one (NBA) is based on very recently published and newly developed detection algorithms and advanced artificial intelligence and machine learning.

Information Center

  • Product Sheet

    Basic info about Threat Intelligence and its technologies

    Download pdf

    View online

  • Deployment Options

    Scheme of single-port and distributed deployment.


  • Risk mgmt. dashboard

    Aggregated output for quick network health overview.


  • Detection with NBA

    Overview of all incidents within the network.


  • Event detail - NBA

    Communication of a trojanized IP to a malware server.


  • Detection with IDS

    Overview of all incidents within the network.


  • Event detail - IDS

    Possible breach of internal IT security policy.


  • Network flow monitoring

    Aggregated traffic for a specific subnet.


  • Network traffic of a user

    One-day network traffic of a single user.


Contact Us

TrustPort keeps your IT secure

TrustPort is a major producer of software solutions for secure communication and reliable data protection. TrustPort products protect home and enterprise customers against known as well as unknown threats. According to several benchmarks they excel in antivirus technology, antispam methods, and encryption technology.

TrustPort products have been highly rated in multiple third party tests such as Virus Bulletin that confirmed the prominent position of TrustPort in the antivirus industry. TrustPort Antivirus has toped the latest several Virus Bulletin comparatives (Aug, 2013 to Feb, 2014) and has proved to have the best malware detection in the world.

The core of Threat Intelligence technology was developed within a research project. This project has been realized with a financial support from the Czech Republic state budget through the Ministry of Industry and Trade.

The Office

  • TrustPort a.s., Purkynova 101, 612 00 Brno, Czech Republic
  • +420 541 244 471