ENDBLOCK

A cybersecurity incident indicates that security devices have already been bypassed by attackers. Since the security devices have been bypassed, it means no security alarms will be triggered, making it nearly impossible to detect an intrusion until a major loss occurs. EndBlock transforms manual cybersecurity forensics into proactive and real-time analysis. Within minutes of a hacker infiltrating the system, EndBlock initiates detection, minimizing potential losses to the smallest extent.

Proactive, Convenient and real-time MDR services

InTimeSec Provide 7x24 Threat Hunting service. Develop Endblock MDR system to serve customers , Customers include government, medical, finance, e-commerce, transmission and technology industries. It has successfully blocked and handled more than hundreds of real attack incidents, demonstrating its outstanding capabilities and rich experience in the security field.

  • EndBlock provides the simplest and most convenient MDR service
  • EndBlock has a team of professionals from China who are familiar with malware analysis and hacker detection and prevention techniques.
  • The main members have worked in government and military information security units, handling information security forensics-related work and have proactive information security incident handling (Incident Response, IR) capabilities.
  • Long-term confrontation and analysis to deal with organized hackers and malicious programs that cannot be detected by security equipment
  • Continuously integrating various EDR products (Microsoft MDE) to provide the most accurate proactive threat hunting services. By providing MDR services, EndBlock is committed to protecting the data security of customers in various industries, making positive contributions and breakthroughs to Taiwan's information security ecosystem.  

EndBlock Services

  • 7x24 MDR services
  • Malware detection, processing and response
  • Analysis and Threat Hunting Services
  • Information security incident handling and consulting services (Unlimited times )
  • Incident response report



Threat Hunting


  • When Malware escapes the Detection function, EDR will record the complete process.
  • 7x24 Threat Hunting analysis capability is the most effective blocking method currently.
  • The combination of EDR and Threat Hunting capabilities is the best solution.

Mitre's Att&CK Lifecycle _ITS EDR+MDR