ExeonThreatReport2018-08-28T09:15:18+00:00

Exeon Threat Report
Order a security review to discover hidden data leaks

Web traffic is the primarily data leakage channel used by sophisticated cyber-attackers as well as browser plugins and other software that put your organization’s privacy at risk. Our Exeon Threat Report security review assesses the security state of your internal network by analyzing web proxy log data (your internal devices’ outgoing web traffic) and flow data. Our engineers deploy ExeonTrace on-site in your data center, analyze your network traffic and provide you with our Exeon Threat Report listing

  • Identified malware/attacker activities.
  • Identified privacy leaks.
  • A fingerprint of active devices allowing you to cross-check your IT inventory (IT inventories are often incomplete and miss devices).
  • An overview of heavily used web and cloud services, allowing you to identify shadow IT services.

Contact us via our contact form for more information or an offer.