THE WORLD FIRST BLACKBOX PLUG&PLAY NETWORK SECURITY DEVICE

Protect your infrastructure with LECS, the first Plug & Play security appliance that protects any LAN and Cloud infrastructure from the most dangerous attacks and cyber threats.

  • Metamorphic Engine.
  • Level Zero OSI Response.
  • Predictive.
  • Inside.
  • Autonomous.

DEFENDS,
WHERE THE FIREWALL CANNOT

Lecs Industry

Discover our success and review

Zero Knowledge Security Network

LECS has a zero knowledge architecture and is maintenance free.
Connected to the network router or switch, LECS analyzes the traffic, movements inside and outside the network and once an anomaly is detected, it classifies and acts according to the degree of severity with a modulated response to the attack.

 

LECS is the ideal partner for lateral movement detection, ransomware and data-exfiltration.

MULTILEVEL ML SECURITY ENGINE

The LECS technology is based on 3 engines that act as the cornerstone of the entire ecosystem.

Specto, Raises and Tiresia are the algorithms that work synergistically and in parallel to protect an entire network segment, performing detection and classification of anomalies on the network traffic, acting with countermeasures and targeted responses in cases of critical threats and making an intelligent forecast that provides an update feedback based on the latest statistics detected.

HOW IT WORKS

Check & connect LECS

Place LECS in the most strategic point of your infrastructure and connect the device to your network switch. LECS defends your network from internal and external threats ensuring maximum privacy as it monitors traffic only passively.

Trap & Detection Analysis

LECS acts as a passive network strategy trap. Confused with hosts, it analyzes threats in real time from within the network classifying them according to impact severity. It also acts as a long-term LOG store by retaining all monitoring statistics.

Impact Isolation Response

In case of high impact threat, the double nature disconnection engine intervenes: Energetic-Physical "L.0" OSI, according to patented procedure. Procedural - Link L2, 3 OSI, according to patented procedure. Immediate alert notification via email/app.

Inspection & Recovery Network

Following the countermeasure, LECS restores the network connection, checks for additional threats, and thanks to the Tiresia algorithm, learns and parameterizes the threat data in the cloud.

product family

Every company has different needs depending on its technological infrastructure and the environment in which it operates. Discover our recommended products and devices for each type of business.

LECS

Version with countermeasure procedural software. Recommended for SMEs, Professional Studies, Web Agency.

LECS +

Version with hardware energy countermeasure. Recommended for Companies, Public Administrations

SaaS

Virtualized version procedural installable on servers, single clients and Cloud systems.

Industry & Corporate

Specific version for large environment with full support to Hybrid network and Machinery Protocol.

real data of the last 6 months

0
Anomaly Detected
0
Blocked Attach bloccati
0
Minacce critiche bloccate

ARE YOU A COMPANY OR investor?

Contact us for a consulting or a business opportunity.

Partner Program

Are you an IT reseller or service company?

LECS offers a structured partnership program to ensure incentives, business opportunities and technical support!

Questo sito usa Cookie tecnici (propri) e Cookie di profilazione (propri e di terze parti) per inviare pubblicità in linea con le tue preferenze. Proseguendo la navigazione acconsenti all’uso dei Cookies. Leggi la Cookies Policy.