contact us

We are here for you!

Contact us.

We will get back to you as soon as possible.

Exeon Analytics AG

Grubenstrasse 12
CH-8045 Zürich
Phone: +41 44 500 77 21


Subscribe to our newsletter, we will provide you with updates about our company and relevant news revolving around cyber security.

You want to know what others say about us? Find all news articles on Exeon here.

Subscribe to our newsletter by entering your name and email address below. We will provide you with updates about our company and relevant news revolving around cyber security.



NDR Evaluation Criteria

An NDR solution allows an enterprise to strengthen its security defence against advanced cyberthreats and other non-malware attacks. As more enterprises opt to leverage cloud technologies and IoT devices in their IT environment, having an NDR solution is a must for any company that wants to become cyber resilient in today's information age.


The importance of Diversity in Cybersecurity

Women are significantly underrepresented in cybersecurity. Even though this trend is shifting, today, women only represent about a quarter of the cyber workforce. Considering the explosive growth and consequential talent shortage in cybersecurity, it is crucial to encourage more women into the cyber industry.


SOC Visibility Triad and the role of NDR solutions

Boosted by the continual advancement of digital technologies, cyberattacks are increasing in number and sophistication. The variety of legacy and modern IT systems in use, the interconnection of appliances (that used to run isolated), and the vast number of third-party suppliers are increasingly challenging to holistically protect the IT landscape.


Why ExeonTrace is the NDR of choice for CISOs of industry-leading companies across Europe

Computer networks are the foundation of today's information age and protecting them is a crucial element to ensure the proper functioning of most IT solutions. As most organisations become heavily dependent on computer networks to facilitate work operations, a disruption in network service can have catastrophic consequences on the affected entity.


How does the analysis of existing network log data secure your IT infrastructure?

We are often asked what exactly differentiates ExeonTrace from other Network Detection and Response (NDR) solutions. Our numerous conversations with security professionals show they find ExeonTrace’s data analysis approach most convincing.

Image of importance of an NDR solution

The Importance of an NDR Solution to Early Detect Supply Chain Attacks in Corporate Networks

Digital transformation has witnessed a boost in recent years, especially in the wake of the COVID19 pandemic, which accelerated the adoption of digital technologies by several years in just a few months. Integrating digital technology in business has brought significant benefits. However, it also opened the door wide for new security risks and vulnerabilities.

Logo IS4IT partnership

IS4IT und Exeon Analytics AG vereinbaren Service-Partnerschaft

Die IS4IT-Gruppe, ein führender Anbieter im Bereich Cybersicherheit, und der Schweizer Security-Experte Exeon Analytics mit Sitz in Zürich haben eine gemeinsame Service-Partnerschaft abgeschlossen. Das Unternehmen wird für Exeon den Service und Support in Deutschland übernehmen. Eine entsprechende Übereinkunft haben die beiden Anbieter im Juni unterzeichnet.

Image of the new pillar of cybersecurity

NDR: The new pillar of cybersecurity

Prevention and protection are still considered the means of choice when trying to safeguard one's own IT systems. However, the fact that this approach is not sufficient can now be read almost daily in the media. 


Next-Gen Network Detection & Response

The average cost of a data breach is a whopping €3.18 million (or $3.86 million at the time of writing this article). As intruders on enterprise networks increased dramatically, it’s now critical to detect and eliminate threats before any real damage is done.

Image of a red alert due to an attack on MS Exchange Server

Attack on MS Exchange Server: BSI declares "red" alert for the first time in seven years

Cyber attacks are becoming more frequent and more serious. The most recent example is the worldwide attack on Microsoft's Exchange Server: In March, hackers infiltrated the system via four security holes. This allowed them to log in as administrator without a password and thus read emails or access passwords and devices of their victims in the network. An estimated 250,000 systems were affected - 30 per cent of them in the DACH region. The fact that so many companies in German-speaking countries fell victim to the attack is no coincidence. In many places, especially in medium-sized businesses, the necessary security awareness is still lacking.

Dark image of a computer displaying "Cyber security" in red on a black screen

How ExeonTrace can help detect the Microsoft Exchange hack

More than hundreds of thousands of Microsoft Exchange servers have been hacked globally, whereas the DACH region seems to be highly affected. This Blogpost explains how ExeonTrace can help to detect the intrusion through automated and manual network analysis.

Close-up of a hooded man in a black sweatshit holding a smartphone with a computer

Cyberattack on Swiss fintechs: surveillance can prevent fatal consequences

Zurich, February 15, 2021 - Various media are reporting today on a warning from the cybersecurity company Eset. The latter had reported that the hacker group "Evilnum" has been targeting Switzerland fintech companies since December 2020.

Closeup picture of the Sun

Blog - Detecting the highly evasive Sunburst attack using an (old) ML model

A wide-spread cyber-attack against multiple government agencies, critical infrastructure providers and private sector organizations such as FireEye was made public this December. The attackers breached their victims’ IT networks by compromising the software supplier SolarWinds, which allowed them to install a Remote Access Trojan (RAT) through SolarWinds’ software update mechanism. In this blog you learn how ML-based detection mechanisms contain such attacks before signatures or Indicators Of Compromise (IOCs) are publicly known.

Picture of a kern in front of the sea

Blog - Cyber attacks threaten financial stability

The global financial stability is increasingly at risk through cyber attacks, claims the IMF according to a recent report. The authors argue that cyber attacks become easier to undertake, increasingly sophisticated and, as an effect, much more prevalent.

Black and white picture of a spider-web

Blog - XDR: A new weapon in the fight against cyber threats

Today, companies collect huge amounts of security-relevant data for cyber monitoring. But the problem lies in efficiently analyzing this data - especially across different data sources. Extended Detection and Response (XDR) reveal new possibilities with the help of AI.

Concrete and brick wall

Blog - Prevention is only half the battle

When a company realizes that its protection concept has failed, it is often already too late. What to do? The Network Detection and Response (NDR) concept offers a new arsenal for cyber defense.

Photo montage with a truck, containers and a plane

Supply chain attacks. The open back door into your IT network

Cyber attackers typically exploit a company’s weakest link to break in and steal data or launch a ransomware attack. Thus, the better you protect your company’s IT infrastructure from external intruders, the safer it is, right? Unfortunately, this is not necessarily true, as you can also be at risk through your trusted suppliers.

Close-up of stacked data-centers

The timeline of a ransomware attack

The foreign exchange service provider, Travelex, had a very unpleasant start into the New Year. They became one of the latest corporate ransomware victims. A cyber attack usually consists of multiple stages, each of which can take days to months. Let’s use Travelex to explain the timeline of a ransomware attack*

Jungle river with small rowing boats

It’s a jungle out there!

Imagine that in the jungle of cyber security, your company's data is the El Dorado for your foes. How would you protect your city of gold?

Black and white picture of a person holding a remote

How hackers communicate - DGA

Have you ever flown a drone? It’s not easy to master, but once you are in control, the experience is unique. You reach places which you otherwise wouldn’t and completely change your perspective. However, a good connection between your remote control and the drone is key. Otherwise, you risk crashing the drone and, in the worst case, losing it. 

Picture of a woman looking away to a misty mountain landscape

You can’t protect what you can’t see

What is your biggest concern when it comes to the state of your organization’s cybersecurity? In a recently published State of Threat Detection Report, 300 Cyber Security professionals have named automation and visibility as the most significant issues for cybersecurity teams.

Dark close-up of a lion roaring

The return of ransomware

Ransomware as a cyber threat is on the rise. Over the summer companies like Meier Tobler, Omya and various German hospitals were affected. Hackers infiltrate businesses through malicious emails, steal and encrypt critical data. Companies are forced to pay a ransom or face the complete loss of their data. The aftermath of an attack can cost companies millions of dollars! While regular data back-ups help to prevent a complete loss, costs related to business interruptions and the risk of having trade secrets revealed should not be underestimated. I strongly recommend to make life hard for every attacker in your system, through a restrictively configured firewall. If you want to know how Exeon helps you to detect holes in your firewall, read the full blogpost or book directly a personal video call.