LECS

Plug&Play basic detection and response device that protects any LAN from the most dangerous cyber attacks with patented countermeasure system.

Detection

The detection engine analyzes traffic, internal movements, and what comes in from outside, and once an anomaly is detected, it ranks it according to the impact of the network anomaly.

Response

In the event that the threat is dangerous to your data, LECS takes progressive action through a special patented procedure designed to block the threat.

LECS ENTERPRISE 2.0

Versatile device with more power. Installable inside the ‘rack cabinet or OT environments. 

Energetic countermeasure

EEnergy Disconnection enables an automatic electrical Air-Gap to safeguard and protect 100% of the attacked network segment.

In addition to the procedural countermeasure, it acts up to layer 1 of the ISO/OSI stack and thus intervenes on a physical security plane to block any malicious activity and threat proliferation.

It natively supports industrial protocols and offers convenient 1/2 U rack mounting.

LECS CORE

Detection scalable and more powerful due to the performance of this device.

Parallel Stop

With superior computing power, it uses a more efficient procedural disconnection procedure due to the simultaneous approach on different networks, blocking threats in the network with a completely innovative approach.

It supports both IT environments and Productive sites, and its ports allow use in environments with high network traffic and high availability.

Lecs Core

LECS EMBEDDED

Virtualized technology

Our advanced technology is characterized by exceptional versatility, enabling complete and smooth integration into all kinds of virtual environments.

This adaptability ensures total and reliable protection, making our system ideal for a wide range of applications, including industrial-level machinery and IoT devices. 

The security we offer extends to all aspects of the digital environment, providing users with the peace of mind they need to work and interact online, as well as protecting critical infrastructure, with maximum security.

LECS CUSTOM

LECS is designed to fit flexibly and efficiently within any IT environment, either through embedded integration directly into devices or by connecting to SIEM systems. 

This integration capability allows LECS to enrich the functionality of security systems with its advanced threat detection and response technology.

Please enable JavaScript in your browser to complete this form.
Name and surname