Research-driven Cybersecurity

Understand Your Network.
Defend What Matters.

Montimage builds open-source security tools — from high-speed deep packet inspection to AI-powered threat detection and 5G fuzzing. Trusted in EU critical infrastructure projects for over 20 years.

700+
Protocols
12+
EU Projects
20+
Years
100%
Open Source
What We Build

Our Capabilities

Because quality for us is a must, we follow the industry's best practices in software monitoring engineering methodologies, and adapt them to meet the specific needs of every client. In this perspective, we carry out a substantial research efforts to bring forth a set of innovative monitoring techniques and tools.

Network Visibility & DPI

High-speed deep packet inspection across 700+ protocols — HTTP/2, QUIC, TLS, MQTT, 5G NAS, and more. Wire-speed analysis from raw capture to real-time dashboards.

Learn more →

AI Security & Explainability

ML-based anomaly detection with Stacked Autoencoders and CNNs. Every alert explained via SHAP and LIME. LLM-powered remediation advice closes the gap from detection to action.

Learn more →

5G / 6G Network Security

Native 5G protocol support — NGAP, NAS, GTPv2. Live fuzzing of AMF, SMF, and gNodeB with 5Greplay. Validated in Horizon Europe projects with real USRP + srsRAN testbeds.

Learn more →

Security Testing & Automation

26 attack types via MAG, AI-powered NetworkFuzzer, and an autonomous pentest management platform. SOAR integration turns detections into automated incident-response in seconds.

Learn more →
Our Approach

Our Services

There is a hacker attack every 39 seconds. It is not a matter of if you are going to be attacked, it is a matter of when.

Step 1

Prevent

The majority of the security breaches are a consequence of unintentional leakage of data. Most threats can be and should be avoided by having a proper security training delivered.

Step 2

Perceive

Most companies take over six months to detect a data breach. By monitoring your network using artificial intelligence, we can detect anomalies in real time.

Step 3

React

Detecting in real time the intrusion attempts is the first step. We enable you to take the decisions regarding your network traffic such as restricting or blocking traffic

Step 4

Mitigate

In the eventuality where networks have already been breached, we can help you by designing recovery plans and avoiding future security related incidents.

Active Research

Our Projects

Innovation is the catalyst to growth. Montimage actively participates in European R&D projects, contributing expertise in network monitoring, cybersecurity, AI, and digital twins.

Latest News

Latest news

Updates from our research, partnerships, and open-source projects.

linkedin May 2026

📢 We're live now at NERO hashtag #TrainingSession series! 🔐 Immersive

📢 We're live now at NERO hashtag #TrainingSession series! 🔐 Immersive and Gamified Cybersecurity Practices for SMEs 📆 19 January 2026 🕙 10:00-11:30 CET 👩‍…

View on LinkedIn
linkedin May 2026

INTACT Horizon, represented by Montimage, joined European Cyber Week -

INTACT Horizon, represented by Montimage, joined European Cyber Week - Official page as part of a shared EU cybersecurity booth alongside CyberSuite, Dynab…

View on LinkedIn
linkedin May 2026

As part of the ENSURE-6G Staff Exchange Programme, I recently started

As part of the ENSURE-6G Staff Exchange Programme, I recently started my secondment at Montimage in Paris. My current work looks at RRC Signalling Storm a…

View on LinkedIn
Trusted By

Our Partners

Montimage actively collaborates with academic research (e.g., Institut Telecom, LRI), research institutes (e.g., CEA, Fraunhofer Fokus, SINTEF) and industrial corporate R&D centers (e.g., Orange, Thales, Nokia, Airbus) in order to better define the future of software engineering and networks.