Detect, isolate, evolve

THE INTELLIGENT SYSTEM THAT NEVER SLEEPS
A Plug & Play system powered by AI for continuous protection.

LECS brings the most advanced technologies used in critical environments within everyone’s reach.

Blackbox and Air-Gap are just a few examples of procedures used in military and aviation applications.

Lecs is what you need.

Today, in many business environments it is difficult to implement complex cyber security solutions and ecosystems especially to manage without specific know-how.
This is why simplifying the approach to cyber security allows companies and professionals to protect their infrastructure.
Our ethical mission therefore encompasses the deployment of scalable security solutions for all.

Plug&Secure

The blackbox inspects any type of IT and OT network without being configured.

Complementary

Productivity remains unaffected: the device works in stealth with the other security systems already in place.

Blockchain

Each LOG detected by the device is validated within its own blockchain.

Privacy

It guarantees standards to European and international data processing regulations.

Automatic

Fully automated updates and countermeasures.

Predictive

With its AI it is able to deeply analyse what is happening in the network and behave accordingly.

Technology

At the heart of LECS technology are three engines: Specto, Raises and TiresIA.

SPECTO

Specto’s Hidden Analysis Classification Logging (HACL) model is at the heart of fully automated real-time threat detection and management operations. Its stealth approach allows it to remain hidden and work in parallel with the network, without impeding normal operations, all while the advanced algorithm analyses and classifies threats and anomalies on the network in real time.

TIRESIA

All operations are supported by the intelligent Tiresia algorithm, which continuously learns and improves not only detection, but also future attack predictions. In fact, it is the first digital intelligence that goes beyond prevention itself, making real cyber threat predictions, thereby greatly increasing the detection capabilities of the entire ecosystem.

RAISES

If a high-risk criticality is detected, the Raises automatic countermeasure intervenes with a procedural and adaptive response, going through different response steps until the last defence of the patented energy response. This technology ensures the most efficient response against all types of threats and lateral movement.

The triangulation

Advanced methods to provide unprecedented protection against cyber threats.

We face threats from all perspectives.

Each corner of the triangle represents an essential component of the detection strategy, designed to address threats from all perspectives:

  • AI Vision: Analyses and correlates data in an advanced way, using artificial intelligence techniques to identify anomalous patterns and hidden correlations between events.
  • Pattern: Instantly recognises known threats, leveraging an always-updated library of malicious signatures and behaviours.
  • Behavioral: Relies on advanced statistical algorithms and mathematical models to study traffic morphology, detecting even the most sophisticated suspicious and anomalous behaviour.

This unique combination allows LECS to act quickly, accurately and effectively, ensuring that no threat goes unnoticed. The triangle represents the perfect synergy between artificial intelligence, data analysis and predictive capability: a dynamic defence optimised for each environment.

Send us a message

LECS is designed to fit flexibly and efficiently within any IT environment, either through embedded integration directly into devices or by connecting to SIEM systems.

This integration capability allows LECS to enrich the functionality of security systems with its advanced threat detection and response technology