NO ! LECS works in a very different way from firewalls.
First of all because a firewall works on the perimeter and is literally “crossed” by the traffic.
LECS instead works from the inside and is not crossed by traffic, so it is a completely different approach both for the detection phase and for the countermeasure phase.
In fact, in some environments it can even ๐ฟ๐ฒ๐ฝ๐น๐ฎ๐ฐ๐ฒ ๐ถ๐, while ๐ถ๐ป ๐ผ๐๐ต๐ฒ๐ฟ๐ ๐ถ๐ ๐ถ๐ ๐ฎ ๐๐ฒ๐ฟ๐ ๐๐ฎ๐น๐๐ฎ๐ฏ๐น๐ฒ ๐ฎ๐น๐น๐ to get where the firewall just can’t.
Yes. And go further.
LECS is innovative because it is specifically designed to complete as much as possible the corporate cyber security, however simple or complex it may be.
In addition, LECS acts in parallel with the rest of the network and is absolutely independent from any other system used, be it EDR ecosystems, multiple software firewall solutions.
Being Plug&Play no technical configuration of the LECS device is required, only the activation procedure of the initial user license through the app.
Sure.
LECS has a self-contained system for managing automatic asynchronous updates that does not require manual intervention.
Yes.
Thanks to the unique approach from the management of detection and LOG phases combined with countermeasure against certain threats, LECS is a valuable tool to actively support your GDPR/16 or different ISO compliance regarding personal data protection and network infrastructure.
Absolutely. LECS performs several checks on internal network traffic. Thanks to the support of the main industrial protocols, it is a protection tool for your production environment (OT) but also for the protection of everything connected such as IoT devices.
For more information, use the CALL button, we are at your disposal for any clarification.