Compromise Detection System (CDS)

Our CDS (Compromise Detection System) is a sophisticated Data Breach Detection Solution that detects breaches and compromised devices by analyzing the network traffic without direct connection to the network devices. The CDS is primarily focused on detecting unknown malware and threats using a behavior-based approach (Machine Learning Methods, Techniques and Algorithms). The CDS is developed to be flexible, user-friendly, scalable and is available in English and French versions.

The CDS has been selected as an Innovation by the Canadian Federal Government. For details, please visit the Canadian government website

The Innovation and Breakthrough Technology of our CDS

The CDS is able to learn the normal behavior of your network and identify abnormalities that are a sign of an infection or malwares. The tool is constantly evolving itself through continuous learning, which allows it to detect current zero-day malwares and those of the future.

Why our CDS is the best data breach solution for your business

Our CDS minimizes the security risks and their impacts through rapid detection of compromises on your network. Today security specialists consider 205 days as an average period to identify compromised systems in a network while our CDS reduces this period to minutes or hours.

How our CDS will help your business

  • Detect unknown (a.k.a zero-day malwares) on your network
  • Detect infected systems that communicate with botnet command and control centers.
  • Detect sensitive information leakage
  • Detect worms spread through your network
  • Detect abnormal malware related communications on your network
  • Detect APT attacks

Why you need our CDS

Antivirus Software is not enough to protect your network

      • They cannot detect unknown malwares and variants of known malwares
      • Our CDS has been developed to detect unknown malwares and variants of known malwares
      • They need the binary code of the malware for analysis
      • Our CDS does not need malware binary code to detect if a device is compromised
      • They are not efficient with high impact, targeted attacks
      • The goal of CDS is to detect such attacks

Firewalls and IDS are not enough to protect your network

      • Attackers use the common ports such as HTTP or HTTPS to exfilter data and services that are authorized by network firewalls
      • Our CDS can detect threats that have passed
      • An IDS is not developed to detect compromised systems
      • Our CDS is specifically develop to detect a compromised system
      • IDS signatures and blacklists can only detect know attacks
      • Our CDS can detect current and future zero-day malwares