Plug & Play protection to ensure business continuity, regulatory compliance and citizen protection.
LECS is the cybersecurity platform that strengthens the security of public institutions and hospitals without requiring advanced expertise or long implementation times.
LECS is the Plug & Play cybersecurity platform designed to act autonomously.
Instant security: A Plug & Play platform designed to act autonomously without the need for specialized personnel.
Protection of dated systems: Active defense for distributed networks that are often outdated and poorly protected.
Continuity of services: We prevent the downtime of critical services such as registry, protocol and health services.
Many diagnostic machines use closed operating systems that do not allow the installation of security software. LECS protects these assets in agentless mode, becoming the barrier against ransomware that exploits these gateways.
In the healthcare sector, downtime can compromise patient safety and disrupt research operations. LECS ensures resilience and reliability without interfering with the performance of medical equipment.
The handling of sensitive data requires the highest compliance standards. LECS ensures data integrity through certified, immutable logs, supporting compliance with NIS2, GDPR, DORA, and ISO standards.
Agentless defense for devices and networks that manage citizen services (such as registry and emergency rooms), providing active protection without installing additional software.
It uses an analysis engine that identifies silent threats and anomalies in IT and OT protocols, neutralizing attacks before they cause disruptions to services.
In the event of an attack, LECS activates automatic countermeasures against threats, raising the organization’s security level without requiring intervention from specialized personnel.
Every security event is immutably certified. This technology ensures full traceability of telemetry for legal, insurance, and regulatory compliance purposes.
Beyond theory, real results. Discover how complex organizations protect their critical assets with LECS technology.






A flexible architecture designed to armor critical infrastructure, ensuring the same reliability across IT, OT and IoT networks.
Protection for MICRO environments.
Includes core Security and Networking services with On-Cloud dashboard. Designed for simplified management and instant access to security features.
High performance for MEDIUM environments.
Solution with an on-cloud dashboard and traffic analysis capabilities designed to manage denser networks.
Full on-premises control for LARGE environments and critical infrastructures.
Designed to handle the highest traffic volumes in critical government sectors. It complies with restrictive policies by ensuring that data and logs never leave the corporate perimeter.
No. LECS operates in agentless mode, meaning it does not require any software to be installed on the device. It protects the machine without altering its original configurations, preserving both its operation and system characteristics.
LECS analyzes network traffic flows to identify threats and suspicious behavior, helping prevent data exfiltration. It also analyzes telemetry rather than sensitive data itself, in compliance with GDPR requirements.
LECS prioritizes operational continuity. In the event of a threat, the system applies patented countermeasures to prevent malware from spreading without interrupting vital services or affecting the performance of medical equipment.
No. LECS is a plug-and-play solution designed to be self-contained. Through the Cloud Dashboard, technical data is translated into clear and operational information. This allows easy management of facility security even without advanced skills.
Certainly. It is one of the strengths of our technology. LECS actively protects critical equipment and operating systems that are obsolete or can no longer be updated, making them secure without the need for direct intervention on the devices.