ORDER A SECURITY REVIEW
Do you want to detect the potential needle in the haystack? During an ExeonThreatReport, our engineers review the security state of your internal network by analyzing proxy log data (your internal devices’ web activities) and/or ﬂow log (NetFlow/IPFIX logs exported by firewalls or Corelight sensors) and DNS log data.
VISIBILITY INTO DATA LEAVING YOUR ORGANIZATION
Cyber attackers and malicious insiders regularly circumvent IT protection measures and breach highly sensitive data. Such breaches often happen in plain sight, hidden in millions of regular activities caused by the web browsing of employees and remain undetected over several months. The current average detection time for a data breach is nearly 200 days. For example, 20 GB of data was stolen this way during a cyber attack against the Swiss defence company Ruag, which remained undetected for more than a year.
Exeon Analytics AG is specialized in detecting hidden data breaches and advanced cyber attacks. With ExeonTrace, our analysis and visualization software, we ﬁnd the so-called needle in the haystack. ExeonTrace is based on award-winning algorithms and effectively identifies gaps in IT security perimeters and detects anomalies in millions of data points (log data).
During our ExeonThreatReport security review, we use ExeonTrace to transform our costumer’s network log data into actionable security insights.