We enhance human intelligence with machine learning to deliver state-of-the-art cyber-threat detection
We work 24/7 to safeguard millions of Internet users all over the world.
Our digital security products are powered by a hybrid force: we combine human and machine-driven research methods to detect and resolve cyber-threats targeting your customers.
DNS Requests
processed every month
Threat Data Entries powering our data bases
New Threats entries fed into our data-bases on average per month
Automated Methods of web categorization detecting cyber-threats
Prevent breaches by predicting the next move of cyber-criminals’
We combine machine intelligence with an expert team of data scientists who have an in-depth understanding of the ever-evolving nature of cyber-threats.
Customer-Oriented Threat Protection
We provide protection against phishing, malware, Trojans, and a full range of cyber-threats targeting your customers.
Advanced Methodology
From image recognition to machine learning and multi-domain correlation, we use advanced content techniques to keep up with new cyber-threats.
Automated Category Checking
We use groupings of DNS domains (e.g. pornography, gambling, violence, illegal drugs) to provide accurate protection at customer level.
Data Privacy guaranteed
We give your customers complete privacy by safeguarding and encrypting all data between your network and our databases at all times.
Global Threat Intelligence
Our security database is securely hosted in Austria, powered by more than 200 virtual machines all over the world.
Anonymized DNS Requests
We give our clients the possibility of improving localized cyber-threat detection, by enabling us to process anonymized DNS requests, in compliance with the Telecom regulations and data privacy laws.
Protect your customers now.
How It Works
Crunching big numbers to provide your customers with easy security solutions.


Out Methods
The hybrid force driving our solutions
- Big Data analysis: We process more than +1,000 billion anonymized DNS requests per month, whereby suspicious domains are identified and fed into our research environment.
- Global Live Sourcing: Our virtual machines are distributed in data centers all over the world, running content analysis 24/7 and providing output to our threat database.
- Human Intelligence: Our team of data scientists ensures the quality of automated website categorization by orchestrating global machine efforts at our central research hub in Europe.
- Ongoing Data Updates: Our threat database is updated in a 2-hourly cycle, targeted at feeding new threat findings directly into our the engines of our customers in real time.
Threat Intelligence
The hybrid force powering all of our solutions
We provide you with a wide range of digital security solutions powered by our leading threat intelligence. Our seamless approach covers all platforms and devices with network and application-based products. We can help you to protect your customers – anytime, anywhere.

All of our product variants exist on the same platform and within the same architecture.
As a result, they complement each other perfectly. Each module can be updated or added to its specific industrial needs. We deliver network-based and application-based security from a single source which comes with many additional tools. We can also optionally monitor and operate the platform for you. As the end users of this solution, your customers will have the same user experience with all product variants.
Behavioral Protection
We provide the solution with maximum security, including protection against malicious web content for mobile and desktop devices. Independently of the type of Internet access, it works within domestic wireless and mobile networks, and on roaming networks.
Device Protection
We make a contribution towards producing an efficient and preventive security layer that allows us to identify deviations from a baseline of normal user normal behavior. Efficient protection of their devices, including anti-virus and malware protection, is guaranteed as a result.
Personal Data Protection
Personal data is an important issue in the information age. We help your customers to prevent their data such as passwords, usernames, account numbers, and other related registration data from ending up in the wrong hands.
Administration & Reporting
We give your customers the ability to make security and content settings which can be used on the devices of children, family members or employees and provide a report which shows statistics, usage, and the security status at a glance.
Marketing
CRM Light:
A campaign tool/engine can be integrated into the CMS software suite and used to configure specific campaigns that will be displayed to subscribers at certain times/events, or implement a try-and-buy / upselling campaign.
Reporting:
A reporting tool can be provided with analysis of interesting data such as the number of requests allowed, blocked, or the most popular domains. This data can be extracted to your existing business intelligence infrastructure.
Monitoring
Our in-house team of experts monitors all functionality 24/7 to provide technical excellence and ensure that your solution performs at the highest level.
Threat Intelligence
Our Threat Intelligence Technology – the hybrid force driving our security solutions
Our digital security products are driven by a hybrid force: we combine human and machine-driven research methods to detect and resolve cyber-threats that are targeting your customers. We prevent breaches by predicting the next move of cyber-criminals. We combine machine intelligence with an expert team of data scientists who have an in-depth understanding of the constantly evolving nature of cyber-threats.

All of our product variants exist on the same platform and within the same architecture.
As a result, they complement each other perfectly. Each module can be updated or added to its specific industrial needs. We deliver network-based and application-based security from a single source which comes with many additional tools. We can also optionally monitor and operate the platform for you. As the end users of this solution, your customers will have the same user experience with all product variants.
Behavioral Protection
We provide the solution with maximum security, including protection against malicious web content for mobile and desktop devices. Independently of the type of Internet access, it works within domestic wireless and mobile networks, and on roaming networks.
Device Protection
We make a contribution towards producing an efficient and preventive security layer that allows us to identify deviations from a baseline of normal user normal behavior. Efficient protection of their devices, including anti-virus and malware protection, is guaranteed as a result.
Personal Data Protection
Personal data is an important issue in the information age. We help your customers to prevent their data such as passwords, usernames, account numbers, and other related registration data from ending up in the wrong hands.
Administration & Reporting
We give your customers the ability to make security and content settings which can be used on the devices of children, family members or employees and provide a report which shows statistics, usage, and the security status at a glance.
Hosting
Our products provide three main hosting options: On-premise, cloud and hybrid. We will find the most suitable solution depending on your needs and capabilities.
Integration
The platform integrates closely and seamlessly into your infrastructure and makes it easy to deal with all users.
Marketing
Light CRM
A campaign tool/engine can be integrated into the CMS software suite and used to configure specific campaigns that will be displayed to subscribers at certain times/events, or implement a try-and-buy / upselling campaign.
Reporting:
A reporting tool can be provided with analysis of interesting data such as the number of requests allowed, blocked, or the most popular domains. This data can be extracted to your existing business intelligence infrastructure.
Monitoring
Our in-house team of experts monitors all functionality 24/7 to provide technical excellence and ensure that your solution performs at the highest level.
Threat Intelligence
Our Threat Intelligence Technology – the hybrid force driving our security solutions
Our digital security products are driven by a hybrid force: we combine human and machine-driven research methods to detect and resolve cyber-threats that are targeting your customers. We prevent breaches by predicting the next move of cyber-criminals. We combine machine intelligence with an expert team of data scientists who have an in-depth understanding of the constantly evolving nature of cyber-threats.
Find the right solutions for your customers.
Use Cases
Digital security for any customer segment
From savvy Internet users to small business owners, you can address profitable customer segments with digital security solutions under your own brand and provide real protection from cyber-threats using our leading technology and our integrated approach.