The first cybersecurity Plug&Play blackbox

DETECTS, ISOLATES AND PROTECTS THE ENTIRE NETWORK

Protect your infrastructure with LECS, the first Plug & Play cybersecurity device that protects any LAN, Cloud infrastructure and industrial facilities from the most dangerous cyber attacks and threats.

Zero Knowledge Security Network

LECS is the ideal partner for lateral movement detection, ransomware and data-exfiltration.

LECS has a zero knowledge architecture and is maintenance-free. Connected to the network switch, the LECS computer security device analyses traffic, movements inside and outside the network and once an anomaly is detected, it classifies it and acts according to the degree of severity with a modulated response to the attack.

MULTILEVEL SECURITY ENGINE

The technology of LECS is based on three engines that act as the backbone for the entire ecosystem.

The artificial intelligence algorithms that work synergistically and in parallel to protect an entire network segment are:

Performing detection and classification of anomalies on network traffic, acting with countermeasures and targeted responses in cases of critical threats, and performing intelligent forecasting that provides update feedback based on the latest detected statistics.

INVISIBLE ALLY AGAINST THREATS

Full, automatic and uninterrupted protection.

While firewalls and antivirus stop at the perimeter, LECS protects the entire network and all types of devices, whether IT, OT or IoT, thus covering even the most vulnerable areas. No need to configure it: just plug it in and you have an active and continuous defence, day and night.

How LECS works

Check & connect LECS

Place LECS at the most strategic point in your infrastructure and connect it to your network switch. LECS defends your network from internal and external threats while ensuring maximum privacy and business continuity as it passively monitors traffic.

Trap & Detection Analysis

LECS acts in stealth mode. Merged with hosts, it analyses threats in real time from within the network, classifying them according to severity of impact. It also acts as a long-term LOG storage by retaining monitoring statistics.

Impact Isolation Response

In the event of a high-impact threat, the dual nature disconnection motor intervenes: Energetic - Physical ‘L0’ OSI, according to patented procedure. Procedural - Active, according to patented procedure. Immediate alert notifications via email/app.

Inspection & Recovery Network

Following the activation of capillary countermeasures, LECS, without interrupting network productivity, checks for additional threats and, thanks to the Tiresia algorithm, learns and parameterises the threat data in the cloud.

Products and devices for your computer security

Every company has different IT security needs depending on its technological infrastructure and the environment in which it operates. Discover our recommended products and devices for each type of business.

LECS
BUSINESS

Versione con contromisura procedurale software. Consigliato per PMI, Studi professionali, piccoli Comuni

LECS
ENTERPRISE 2.0

Versione implementabile in Rack. Contromisure Air-Gap.
Perfetto per ambienti medi e Produttivi

LECS
CORE 2P

Il modello più potente,
possibilità scalabile one-click, multi porta. Per esigenze e flessibilità in Corporate o OT

LECS
CORE 4P

Versione con contromisura procedurale software. Consigliato per PMI, Studi professionali, piccoli Comuni

LECS
CORE SFP

Versione implementabile in Rack. Contromisure Air-Gap.
Perfetto per ambienti medi e Produttivi

LECS in the World

LECS is already at the side of companies all over the world.

Thanks to our patented technology and ease of use, thousands of networks and critical devices in every industry can be protected, ensuring global security without borders.

Actual data for the last 6 months

Detected anomalies
0
Blocked attacks
0
Critical Threats Blocked
0