Newsletter
location
contact us

We are here for you!

Send me a message

Send us a message

Exeon Analytics AG

Grubenstrasse 12
CH-8045 Zürich
Switzerland

Use cases

From network visibility - finding shadow IT, data breaches, and ransomware - to threat and intrusion detection, to an efficient investigation of security incidents: ExeonTrace can solve various issues for your security team. Is your use case not covered? Contact us and we will find a solution.


Visibility – Understand your network's data flows

Understand the communication of critical networks and be able to comply with the latest data protection regulations. Detect data breaches early on and harden your firewall without interrupting crucial business activities. 

  • Detection of hidden data leaks like browser plug-ins or data collecting software  
  • Detection of unusual services in your network 
  • Detection of undesired/malicious calls to internal services  
  • Identification of misconfigured devices 
  • Unauthorized and outdated devices: Clustering of machine-to-machine (M2M) devices for outlier detection (internal shadow IT) 
  • Internal Shadow IT: Correlation with CMDB information  
  • External Shadow IT: Detection of unauthorised cloud services or uploads. 
  • Correlate network data with other log data sources to cover custom use cases 


Detection - The alarm system for your network

Detect cyber threats and intrusions such as advanced persistent threats (APT), ransomware hackers, supply chain attacks or data breaches through exposed insecure systems in an automated manner.

  • Detecting hidden HTTP(S)-based command and control channels, such as to prevent data breaches  
  • Detecting malware using Domain Generation Algorithms (DGAs) 
  • Detection of lateral movements, e.g. the spreading of ransomware and other intrusions in your enterprise network.  
  • Detection of horizontal and vertical scanning within your network 
  • Detecting covert DNS channel: Hidden data leakage via Domain Name System (DNS) 
  • Correlation with selected threat feeds (blacklists) 


Investigation - Efficient analysis of security incidents

Act faster and better on security alerts by instantly seeing all relevant information. Our algorithms minimize false alarms and automatically prioritize incidents by threat level. 

  • Save crucial time in security operations and reduce your team workload 
  • See an intuitive graphic representation of security incidents for effective investigation 
  • AI-driven threat scoring for efficient incident prioritization 
  • Correlation of data from various data sources to quickly get the full picture 
  • Compact representation of billions of data points – greatly reducing data amounts for long-term storage and archiving

We use cookies to help you use our website. To find out more about cookies, see our Privacy Policy.