CISO Challenge #12

I don’t know whether I can trust the third-party applications in my network

Recent supply chain attacks (Sunburst, Microsoft or Kaseya) have shown how vulnerable third-party providers can be – opening doors into corporate networks

Exeon’s approach
Exeon’s approach

All network traffic is analysed – including third-party applications
Benefits for CISOs and security teams
Benefits for CISOs and security teams

Complete transparency of the entire network
Early detection of potential malware
Immediate recognition of network traffic anomalies

Future-proof NDR

ExeonTrace gets log data from many collection points

Instead of getting the data only from core switches, ExeonTrace integrates log data from many and distributed collection points, which results in detailed visibility and superior analytics.

pic ciso challenge

Other challenges you might have:

Unique benefits of ExeonTrace

Comprehensive visibility

Comprehensive visibility

Visibility into your entire IT/OT network and all its interfaces to identify vulnerabilities (exposed services, shadow IT etc.) and malicious attack patterns in real-time.

Not affected by encryption

Not affected by encryption

Algorithms are unaffected by encrypted payloads since they are built to detect attack patterns based on metadata and not deep packet inspection.

Light-weight log data

Light-weight log data

Analysis of light-weight network log data instead of data-heavy traffic mirroring. Metadata can be exported from existing network sources (switches, firewalls etc.) without hardware sensors.

Developed in Switzerland

Developed in Switzerland

As an established Swiss NDR solution, based on a decade of research at ETH Zürich, we maintain a high level of innovation and privacy, which is incorporated in our ExeonTrace platform.