Our machine learning and big data algorithms
are tailored to detect known and unknown cyber threats
and trace them back to their origin.
With our pre-defined analyzers, ExeonTrace trawls
through billions of log data points and alerts
with a minimal false positive rate.
ExeonTrace supports your compliance
with GDPR, PCI and further regulations.
ExeonTrace's unique visualizations enable you
to understand and monitor large
and complex networks.
Understand your network's data flows
In today's corporate networks, billions of interactions happen every day. Keep an overview with ExeonTrace.
The alarm system for your network
It takes companies on average 206 days to detect cyber attackers in their network. ExeonTrace reduces this time period to only one day.
Efficient Security Analytics
Investigate security incidents easily
ExeonTrace converts raw log data into a compact connection graph, allowing you to easily browse through historical data.
Our software is based on years of research at ETH Zurich, one of the globally leading tech universities. The result is an outstanding software featuring:
Best-in-class algorithms for network traffic analysis
Using your existing IT hardware as sensors
Deployable in a single day
Ready-made analyzers for your security use cases
You remain in control of your data
Proxy/secure web gateway analysis
Analysis of the web activities of your internal devices.
Requirements: Proxy logs recorded by an SSL/TLS-intercepting secure web gateway.
Flow and DNS analysis
Analysis of your internal & external network traffic.
Requirements: Firewalls/switches capable of exporting NetFlow v5/v9/IPFIX log data or Corelight sensors. DNS logs recorded by our network sensor or your DNS resolvers.
Correlation of various data sources.
Data sources: CMDB, network, host and application log data.