Focusing on what’s already inside your perimeter and where data leaves your network, the ExeonThreatReport is the ideal addition or alternative to a penetration test.
Our engineers deploy ExeonTrace on-site in your data center, analyze your network traffic and provide you with our detailed ExeonThreatReport.
ExeonTrace's big data algorithms and machine learning extract hidden information from millions of network records. This allows for full visibility of your network as well as the quick detection and containment of threats and data breaches.
ExeonTrace is easy and light-weight to deploy, as it loads log data from Splunk, Elasticsearch or raw files.
Analysis of your internal & external network traffic.
Get full visibility, incl. communications patterns, data leaks, unusual services and access patterns, and misconfigured devices
Detect attacks: malware, lateral movement, horizontal and vertical scanning, covert channels
Uncover internal shadow-IT: Not registered devices and services
Analysis of the web activities of your internal devices.
Detect data leaks, such as browser plugins or software collecting data
Detect attacks: Malware and hidden HTTP(S) channels
Identify unauthenticated proxy access and unauthorized/outdated devices
Uncover external shadow-IT: Unauthorized cloud services and uploads