The Montimage products portfolio consists of best-in-class network security technology. We are constantly developing and improving our products. Our team is always here in order to implement innovation to stay ahead of the malicious intents.
MMT-APS is a new game-changing solution. We provide a very novel way to deal with Advanced Persistent Threats. Detecting and blocking of 0-day attacks. Patented technique that allows separating legitimate network traffic from malicious traffic.
MMT-AM is is dedicated to Renishaw machines but can be ported to other equipment (contact us for more information). It relies on our experience and knowhow in Machine Learning (ML), complex data processing, and real-time monitoring of complex systems to detect important outputs of the modelled process and identify potential defects. Easy-to-use and well-developed analysis of production builds. Increased quality of final product. Proof-of-concept anomaly detection in printing processes. Reduction of time and resources wasted on faulty products. Easier control and monitoring of the Additive Monitoring process.
Analyze how your Internet connection is used. Block certain types of content (sites, applications, social networks). Allow applications and services in your network. Block ads before they reach your device. Establish f ull control on all your devices. ...and more features being developed as you read these lines...
Real-time and historical views. Advanced rules engine. Correlation between network and application events. Detection of performance, operational and security incidents. Easy-to-use customizable user interface.
Even when your WiFi is being monitored and secured, Smart Home devices require an extra security layer. MMT-IoT helps you securing your connected home from outside intruders. It is a perfect complement for MMT-Box that: Actively monitors your IoT devices. Detects and blocks attacks on Smart Home devices. Extends the functionality of MMT-Box to monitor and secure IoT networks.
The main use of MMT-LB is to separate network traffic according to the traffic’s protocols or applications. Separates the traffic, while respecting the sessions (i.e., sticky sessions). Allows for instance analysing each part of the traffic. Uses disjoint security verification rules. Improves the scalability of the analysis with respect to the amount of traffic and the number of rules used.
Create 4G and 5G ready LTE networks on-the-go: Fast deployment in 5 minutes. IoT ready network infrastructure (slicing, efficiency). Reliable and robust core for emergency and safety networks. Future proof with extensions to become 5G core. Integrated with software-defined networking and network function virtualization.