ProductUpdated on 6 March 2026
TINA - Automated Advanced Threat Protection
Founder / CEO at Mevertech
Malmö, Sweden
About
TINA increases cybersecurity defence posture of important information sources.
TINA is an automated system that detects and prevents advanced threats by It's own technologies. It's a hybrid system; consists of network hardware and a cloud central. Working on-premises, hardware analysis network activities against unknown activities and threats. Central systems, consisting of different stack of technologies, on cloud gathers information about internet based threats and enhances local protection by intelligence sharing. Those systems are continuously synchronised with local hardware with the servers located on AWS cloud. Central management system located on AWS, also enables users to manage multiple local devices remotely with a very secure connection layer.
TINA is uniquely coded and developed by ISR - Information Security Research - a private startup company. It is uniquely designed for detection and prevention of advanced level cyber attacks and zero-day attacks. Hardware located on premises includes honeypot systems, packet inspection and lateral movement detection and more analysis techniques.
In addition to own-coded protection technologies, with latest project - TINA BASE - has also modules that can be customised to harden the security posture as needed in various projects. An example of manageable add on modules can be: Secure remote connection; admins or 3rd party companies can be able to connect to internal network with a much more secure layer, or Isolation; TINA BASE can isolate the devices from other networks, while analysing unknown traffics and threats, or Alarming; detection of breach or unwanted external activities, and many other modules that can work in a hardened, secure BASE.
While the new attack behaviours and sources are continuously added to TINA CTM; with newly developed TINA BASE system, threat vectors arising from a specific project or threat vectors against a location, or any specific concerns can be evaluated; detection and prevention or action modules can be added as a module in a very short time with a speed of startup.
Looking for
- Distribution Partner
- Importer
Applies to
- ICT
Organisation
Similar opportunities
Project cooperation
- Early
- Research
Joel Utsi
PhD Student at European Spallation Source (ESS)
Lund, Sweden
Expertise
Ingegerd Wirehed
Information Security Expert and advisor at Lund University
Lund, Sweden