
Network Detection & ResponseExeon Analytics
AI-powered NDR: Secure encrypted, hybrid networks without traffic mirroring or hardware sensors.
Vendor
Exeon Analytics
Company Website
ExeonTrace…024-en (1).pdf


Product details
Overview
ExeonTrace is a next-generation Network Detection and Response (NDR) solution developed by the Swiss cybersecurity firm Exeon Analytics. Unlike traditional NDR systems that rely on traffic mirroring and deep packet inspection, ExeonTrace utilizes metadata analysis, allowing for efficient monitoring of encrypted and hybrid network environments without the need for additional hardware sensors. This approach ensures comprehensive visibility across IT, OT, IoT, and cloud infrastructures, enabling organizations to detect and respond to cyber threats effectively.
Features and Capabilities
- Metadata-Based Analysis: Analyzes lightweight network log data (e.g., NetFlow, IPFIX, firewall logs) instead of full packet captures, reducing data volume and preserving network performance.
- Encrypted Traffic Visibility: Specialized algorithms provide insights into encrypted data flows, overcoming limitations of traditional NDR solutions.
- Hardware-Free Deployment: Operates without the need for physical sensors or agents, leveraging existing infrastructure for data collection.
- Comprehensive Network Coverage: Monitors diverse environments, including IT, OT, IoT, and cloud networks, ensuring holistic security oversight.
- AI-Driven Threat Detection: Employs supervised and unsupervised machine learning models to identify anomalies and potential threats in real-time.
- Intuitive Visualization: Offers user-friendly dashboards and graphical representations for efficient incident analysis and response.
- Scalable Data Reduction: Utilizes graph databases to store and analyze data, achieving significant reduction in data volume (e.g., log data by a factor of 100).
- Seamless Integration: Compatible with existing SIEM systems, enhancing their capabilities with advanced detection algorithms and visualizations.
- Rapid Deployment: Designed for quick implementation, minimizing disruption and accelerating time-to-value for security operations.
- Compliance and Reporting: Facilitates adherence to regulatory requirements through detailed logging and reporting features.