Protect your infrastructure with LECS, the first Plug & Play cybersecurity device that protects any LAN, Cloud infrastructure and industrial facilities from the most dangerous cyber attacks and threats.
ACTS WHERE THE FIREWALL CANNOT
LECS has zero knowledge architecture and is maintenance-free. Connected to the network router or switch, the LECS cybersecurity device analyzes traffic, movements inside and outside the network, and once an anomaly is detected, it classifies it and acts according to the degree of severity with a modulated response to the attack.
LECS is the ideal partner for lateral movement detection, ransomware, and data-exfiltration.
The technology of LECS is based on 3 engines that serve as the cornerstone for the entire ecosystem. Specto, Raises, and Tiresia are the machine learning algorithms that work synergistically and in parallel to protect an entire network segment, performing anomaly detection and classification on network traffic, acting with countermeasures and targeted responses in cases of critical threats, and performing intelligent prediction that provides update feedback based on the latest detected statistics.
Place LECS at the most strategic point in your infrastructure and connect the device to your network switch. LECS defends your network from internal and external threats while ensuring maximum privacy as it only passively monitors traffic.
LECS acts as a passive strategic network trap. Confused with hosts, it analyzes threats in real time from within the network by classifying them according to the severity of impact.
It also acts as a long-term LOG store by retaining all monitoring statistics.
In case of high-impact threat, the dual nature disconnection motor intervenes:
Energetic – Physical “L.0” OSI, according to patented procedure.
Procedural – Link L2, 3 OSI, according to patented procedure.
Immediate alert notification sent via email/app.
Following the countermeasure, LECS restores the network connection, checks for additional threats, and through the Tiresia algorithm, learns and parameterizes the threat data in the cloud.
Every business has different cybersecurity needs depending on its technology infrastructure and the environment in which it operates. Discover our recommended products and devices for each type of business.
Version with countermeasure procedural software. Recommended for SMEs, professional firms, web agencies
Version with hardware energy countermeasure.
Recommended for Companies, Public Administrations
Virtualized version procedural installable on servers, individual clients and Cloud systems.
Custom version implementable in Rack. Customizable countermeasures.