Intelligent, automated defense for manufacturing plants, utilities, construction sites and distribution networks.
LECS is the Plug & Play, invisible and automatic BlackBox capable of protecting PLCs, SCADA and critical machinery without interrupting production.
We turn security into a competitive advantage for the protection of every production facility.
LECS ensures business continuity by intervening instantaneously to prevent industrial processes from stalling and safeguard worker safety. A single incident can cause multimillion-dollar plant shutdowns.
The interconnection between PLCs, SCADA and IT networks expands the attack surface. LECS armors the physical cyber ecosystem, identifying silent threats and anomalies in industrial protocols before they compromise production.
We support compliance with NIS2, GDPR and ISO. Every log notarized, creating an immutable record that certifies the integrity of data and business know-how against sabotage or theft.
Monitors PLC, SCADA and HMI flows without interfering. Recognizes anomalies in industrial processes and takes action to prevent alterations in chemical recipes or production cycles.
Designed to also operate On-Premises, LECS provides total protection of networks that are isolated or without Internet access. Your resilience is independent of external connectivity.
Blocks threats attempting to move from the IT network to production departments. Acts by preventing malware propagation to other lines.
Notarizes each event with time stamps. Provides immutable, security audit-ready reports, ensuring CRA compliance.
From production facilities to remote construction sites, we protect business continuity on a global scale.
The strength of LECS is demonstrated by its ability to withstand the most critical conditions in the industrial world, ensuring the safety of workers and the stability of the physical cyber ecosystem.






Non-invasive security for critical equipment and industrial assets.
Many industrial assets and control systems operate with proprietary software that does not allow the installation of traditional defenses. LECS solves this problem by being agentless: it analyzes network traffic and neutralizes threats without requiring additional software on devices, preserving system uptime.
Through the Cloud Dashboard, the complexity of industrial protocols is translated into clear operational information, simplifying monitoring for management.
A modular structure designed to armor production assets and know-how, providing native defense over OT, IT and IoT networks.
Agile protection for MICRO environments.
On-Cloud dashboard solution that includes core Security and Networking services. Designed for simplified management, provides host protection and real-time notifications through rapid deployment on dedicated or virtual hardware.
High performance for MEDIUM environments.
On-Cloud dashboard solution with superior computing power and traffic analysis capabilities to manage denser networks. Ideal for supervising IT/OT networks that require greater depth of log analysis.
Full on-premises control for LARGE environments and critical infrastructures.
Designed to handle the highest host volumes.
Responds to restrictive policies by ensuring that logs never leave the corporate perimeter.
No. LECS operates in Stealth mode and analyzes traffic passively by mirroring the network. It does not intervene in the physical path of control packets, ensuring zero latency and maintenance of original production cycle times.
LECS protection can also be 100% On-Premises. This ensures active and autonomous defense even in totally offline environments, with no dependence on the cloud for security operations.
No. Thanks to LECS technology, it does not require the installation of any software onboard the machines. It connects externally to the network, protecting critical assets and legacy systems without the need for upgrades or configuration changes.
LECS monitors data flows by identifying exfiltration attempts or unauthorized access to process servers by performing countermeasures to protect the data.
OEMs can offer “Secure by Design” machinery that is already compliant with Cyber Resilience Act (CRA) requirements. This not only increases the value of the supply, but also protects remote access for maintenance.