contact us

We are here for you!

Contact us.

We will get back to you as soon as possible.

Exeon Analytics AG

Grubenstrasse 12
CH-8045 Zürich
Phone: +41 44 500 77 21

ExeonThreatReport - The quick and revealing security review

The ExeonThreatReport security review thoroughly assesses the security state of your internal network by analyzing network flow and DNS log data and/or web proxy log data. Get total network visibility. Fully understand your data flows. Quickly uncover risks, threats, and data breaches.

Focusing on what’s already inside your perimeter and where data leaves your network, the ExeonThreatReport is the ideal addition or alternative to a penetration test.

Our engineers deploy ExeonTrace on-site in your data center, analyze your network traffic and provide you with our detailed ExeonThreatReport.

ExeonTrace's big data algorithms and machine learning extract hidden information from millions of network records. This allows for full visibility of your network as well as the quick detection and containment of threats and data breaches.

ExeonTrace is easy and light-weight to deploy, as it loads log data from Splunk, Elasticsearch or raw files.

Project timeline


Setup and configuration of ExeonTrace for your corporate network.


Our engineers analyze one week of log data.


Our engineers provide a report with the findings.

Please enter your information below to download.



Report types

Get the Complete ExeonThreatReport or choose from:

Network Report

Analysis of your internal & external network traffic.

  • Get full visibility, incl. communications patterns, data leaks, unusual services and access patterns, and misconfigured devices

  • Detect attacks: malware, lateral movement, horizontal and vertical scanning, covert channels

  • Uncover internal shadow-IT: Not registered devices and services


Web Report

Analysis of the web activities of your internal devices.

  • Detect data leaks, such as browser plugins or software collecting data

  • Detect attacks: Malware and hidden HTTP(S) channels

  • Identify unauthenticated proxy access and unauthorized/outdated devices

  • Uncover external shadow-IT: Unauthorized cloud services and uploads