Rock-solid cyber security

Rock-solid cyber security

ExeonTrace
Find hidden cyber threats

Our flagship product ExeonTrace uses machine learning and clustering algorithms to understand the activities in your corporate network and to identify and investigate malware infections and data breaches. ExeonTrace is easy and light-weight to deploy, as it analyzes existing network and event log data that can be loaded from Splunk, Elasticsearch or raw files.

Find out more

ExeonThreatReport
Order a security review

Millions of regular IT activities every day allow cyber attackers and malicious insiders to simply hide among these them. Our security review ExeonThreatReport assesses the security state of your internal network by analyzing secure web gateway log data and/or flow and DNS log data.

Find out more

ExeonTrace
Find hidden cyber threats

Our flagship product ExeonTrace uses machine learning and clustering algorithms to understand the activities in your corporate network and to identify and investigate malware infections and data breaches. ExeonTrace is easy and light-weight to deploy, as it analyzes existing network and event log data that can be loaded from Splunk, Elasticsearch or raw files.

Find out more

ExeonThreatReport
Order a security review

Millions of regular IT activities every day allow cyber attackers and malicious insiders to simply hide among these them. Our security review ExeonThreatReport assesses the security state of your internal network by analyzing secure web gateway log data and/or flow and DNS log data.

Find out more

News

New Blog Post: The return of ransomware

September 20th, 2019|

https://exeon.ch/the-return-of-ransomware/ ‎

Ransomware as a cyber threat is on the rise. Over the summer companies like Meier Tobler, Omya and various German hospitals were affected. Hackers infiltrate businesses through malicious emails, steal and encrypt critical data. Companies are forced to pay a ransom or face the complete loss of their data. The aftermath of an attack can cost companies millions of dollars!

While regular data back-ups help to prevent a complete loss, costs related to business interruptions and the risk of having trade secrets revealed should not be underestimated. I strongly recommend to make life hard for every attacker in your system, through a restrictively configured firewall. If you want to know how Exeon helps you to detect holes in your firewall, read the full blogpost or book directly a personal video call.

End of Factory 1 Acceleration Program

June 20th, 2019|

Carola Hug and David Gugelmann had a great week in Vienna, presenting Exeon Analytics in front of selected guests. Many thanks to the Kapsch Group and in particular to the amazing team behind Factory 1.

CyCon 2019

June 18th, 2019|

Exeon Analytics’ contribution to the NATO Cyber Defense Conference (CyCon 2019). Our research paper “Detection of Malicious Remote Shell Sessions”, to which researchers from ETH Zürich, Kudelski Security, armasuisse W+T and Exeon Analytics contributed, has been presented at this year’s CyCon. The publication is available here. For more information, click here.

See all news

Newsletter

Subscribe to our newsletter by entering your name and email address below. We will provide you with updates about our company and relevant news revolving around cyber security.

I confirm that I have read and accepted the Terms of Service and Privacy Policy.

Exeon Analytics in 47 Seconds