Our machine learning and big data algorithms
are tailored to detect known and unknown cyber threats
and trace them back to their origin.
With our pre-defined analyzers, ExeonTrace trawls
through billions of log data points and alerts
with a minimal false positive rate.
ExeonTrace supports your compliance
with GDPR, PCI and further regulations.
ExeonTrace's unique visualizations enable you
to understand and monitor large
and complex networks.
ExeonTrace quickly identifies gaps in your IT Security and detects anomalies and suspicious behaviour in millions of data points (log data). Unlike other solutions, ExeonTrace can analyse threats across various data sources by correlating their data, hereby offering a unified solution for your enterprise.
In today's corporate networks, billions of interactions happen every day. Keep an overview with ExeonTrace.
It takes companies on average 206 days to detect cyber attackers in their network. ExeonTrace reduces this time period to only one day.
ExeonTrace converts raw log data into a compact connection graph, allowing you to easily browse through historical data.
Our software is based on years of research at ETH Zurich, one of the globally leading tech universities. The result is an outstanding software featuring:
Best-in-class AI algorithms for network traffic analysis
Quick deployment: Using your existing IT hardware as sensors
Ready-made analyzers for your security use cases
You remain in control of your data
ExeonTrace comes in two modules, each including the software, as well a service package for set up, training and support by our experts. The modules can be employed individually or together.
Module 1: Proxy/secure web gateway analysis
Analysis of the web activities of your internal devices.
Requirements: Proxy logs recorded by a SSL/TLS-intercepting secure web gateway. Proxy logs stored in Elasticsearch, Splunk or as raw files.
Module 2: Flow and DNS analysis
Analysis of your internal & external network traffic.
Requirements: Firewall(s) capable of exporting NetFlow v5/v9 or IPFIX log data or Corelight sensors. DNS logs recorded by a resolver or network sensor (optional). Log data stored in Elasticsearch, Splunk or directly sent to ExeonTrace.