Get 24/7 incident response assistance from our global team
- APAC: +65 3159 4398
- EU & NA: +31 20 890 55 59
- MEA: +971 4 540 6400
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.
Choose your product:
Detect and Disrupt Cyberthreats with unprecedented speed and accuracy to reduce your cyber risk
Extended Detection and Response enables you to detect, hunt and respond to threats faster and more efficiently with Endpoint Detection & Response, Network Traffic Analysis, Malware Detonation and Email Protection powered by Group-IB
XDR Correlation
Consolidated Data lake across Telemetry
Incident management
Integrated Threat Intelligence
Single Incident Response Console
TI Graph View
Upload Suspicious file for Detonation
Interactive Sandbox Environment
Support
API
Endpoint Forensics Data Retention for Threat Hunting
Forensics Evidence Collection
Streamlined response
Indicators of Compromise Collection
Asset Inventory
Application Allow and Deny list
Suspicious File Detonation
BIOS / UEFI Firmware Threat Protection
Antivirus protection (Cloud Only)
Spam filtering (Cloud Only)
Policy-based content filtering (Cloud Only)
Email history and logs
Malicious email blocking
Malware & Links Detonation (sandbox)
Full Malware Detonation reports with deep IOCs and analytical evidence
Threat attribution
Group-IB Cloud-to-Ground Tunneling Technology to improve detonation
Group-IB VM Morphing Technology
Flexible Automated Environment Adaptation
On-prem availability
Network Traffic history and logs
NTA Virtual Appliances
Full NTA Functionality
Network File Intercept and Detonation
Threat attribution powered by Group-IB Threat Intelligence
Group-IB Cloud-to-Ground Tunneling Technology to improve detonation
Flexible Automated Environment Adaptation
Attack Surface Management
Managed Extended Detection and Response offers fully managed threat detection, hunting and response powered by Group-IB's Endpoint Detection & Response, Network Traffic Analysis, Malware Detonation and Email Protection
24/7 Managed Detection
DFIR Priority Access
Managed Response
Managed Threat Hunting
Generic MTH Status Reports
Named Threat Hunter
Customer-specific Threat Landscape
Tailored MTH Status Reports
Monthly MTH Status Meetings
Endpoint Detection & Response enables you to quickly and efficiently detect, hunt and respond to threats on your endpoints
Endpoint Forensics Data Retention for Threat Hunting
Forensic Data Collection from Endpoints
Threat Intelligence Feed
Asset Inventory
Application Allow and Deny list
Suspicious File Detonation
Bios Setup/ UEFI Firmware Threat Protection
Threat Hunting Console
Full Malware Detonation Reports with Deep IOCs and Analytical Evidence
Threat attribution
Group-IB Cloud-to-Ground Tunneling ® Technology to improve detonation
Group-IB VM Morphing ® Technology
Flexible Automated Environment Adaptation
Develop your inhouse cybersecurity competencies to operate effectively and protect your company from cyber threats