NO ! LECS works in a very different way from firewalls.
First of all because a firewall works on the perimeter and is literally “crossed” by the traffic.
LECS instead works from the inside and is not crossed by traffic, so it is a completely different approach both for the detection phase and for the countermeasure phase.
In fact, in some environments it can even 𝗿𝗲𝗽𝗹𝗮𝗰𝗲 𝗶𝘁, while 𝗶𝗻 𝗼𝘁𝗵𝗲𝗿𝘀 𝗶𝘁 𝗶𝘀 𝗮 𝘃𝗲𝗿𝘆 𝘃𝗮𝗹𝘂𝗮𝗯𝗹𝗲 𝗮𝗹𝗹𝘆 to get where the firewall just can’t.
Yes. And go further.
LECS is innovative because it is specifically designed to complete as much as possible the corporate cyber security, however simple or complex it may be.
In addition, LECS acts in parallel with the rest of the network and is absolutely independent from any other system used, be it EDR ecosystems, multiple software firewall solutions.
Being Plug&Play no technical configuration of the LECS device is required, only the activation procedure of the initial user license through the app.
LECS has a self-contained system for managing automatic asynchronous updates that does not require manual intervention.
Thanks to the unique approach from the management of detection and LOG phases combined with countermeasure against certain threats, LECS is a valuable tool to actively support your GDPR/16 or different ISO compliance regarding personal data protection and network infrastructure.
Absolutely. LECS performs several checks on internal network traffic. Thanks to the support of the main industrial protocols, it is a protection tool for your production environment (OT) but also for the protection of everything connected such as IoT devices.
For more information, use the CALL button, we are at your disposal for any clarification.