Next-Gen Network Detection & Response
ExeonTrace, our leading network security software solution, leverages Machine Learning to provide comprehensive network monitoring, instant detection of potential cyber threats, and efficient responses to safeguard your organization.
By addressing your IT security challenges, ExeonTrace not only assists your security teams in their daily tasks but also elevates your cybersecurity posture to the next level.
Our Advanced Security Platform Has Been Awarded and Recognized Worldwide:

Exeon Participates in the NATO Locked Shields Exercise
We are proud to have been part of an international contingent, providing cybersecurity experts Dr. sc. David Gugelmann, Dr. Markus Happe and Philipp Lachberger, and our Network Detection and Response technology to support the world’s largest live-fire cyber defense exercise.

Exeon as Member of Germany's Alliance for Cybersecurity
As an official participant of the “Allianz für Cyber-Sicherheit” of Germany’s Federal Office for Information Security, we continuously stay in dialogue with other companies and institutions on topics such as attack vectors, suitable protective measures, tips on security management, incident handling, and more.

What Our Customers Say

Nils Planzer
CEO & Owner, Planzer
As CEO and owner of a fast moving logistics company, I cannot afford any system interruptions due to cyber incidents. With ExeonTrace, we have found a Swiss solution to monitor our network and quickly detect cyber threats.

Head IT Security
PostFinance AG
PostFinance has chosen ExeonTrace because of its open and future-proof architecture. Not needing any hardware sensors and being able to control data flows, we didn’t have to make any significant changes to our existing infrastructure. We are also convinced by the cooperation with the competent and technically outstanding Exeon team.

Christian Keller
CISO, SWISS Airlines
As the Swiss national airline, we are driven by a passion for exceptional performance, in the spirit of our guiding principles. A stable and secure IT is the most important basis for an excellent customer service. For the security of SWISS IT, we use Exeon as a central cybersecurity tool, fully managed by our long-term partner Reist Telecom AG. A perfect combination and solution to monitor our network and quickly detect any kind of anomalies.
Why Global Organizations Love ExeonTrace

Comprehensive Visibility
Visibility into your entire IT/OT network and all its interfaces to identify vulnerabilities (exposed services, shadow IT etc.) and malicious attack patterns in real-time.

Unaffected by Encryption
Algorithms are unaffected by encrypted payloads since they are built to detect attack patterns based on metadata and not deep packet inspection.

Light-weight Log Data
Analysis of light-weight network log data instead of data-heavy traffic mirroring. Metadata can be exported from existing network sources (switches, firewalls etc.) without hardware sensors.

100% Swiss
As an established Swiss NDR solution, based on a decade of research at ETH Zürich, we maintain a high level of innovation and privacy, which is incorporated in our ExeonTrace platform.
The Most Innovative Solution to Detect Advanced Threats

Visibility
Achieve complete network transparency
Monitor and understand complex networks through intuitive visualisations. Benefit from an extensive global map of traffic sources.

Detection
Immediately identify cyber threats
Leverage cutting-edge machine learning algorithms to detect sophisticated cyberthreats. Rapid network anomaly detection.

Response
Respond quickly and effectively
Leverage AI-driven threat scoring and rapid investigation to analyse and respond immediately.
More from our Cyber Security Experts

16.01.2025
The New Reporting Obligation for Cyberattacks in Switzerland
From January 1, 2025, a reporting obligation for cyberattacks on critical infrastructure came into force, regulated by the Information Security Act and the Cyber Security Ordinance. This aims to increase national resilience to cyber threats, recognize attack patterns at an early stage and promote the exchange of information. What does this cover and are you prepared?

11.12.2024
How to Stay Secure While NIS2 Takes Its Time
NIS2 was intended to set a new standard for cybersecurity in the EU. However, local law implementation has been delayed in several countries, impacting security in those companies affected by and exposed to regulatory uncertainty and increasing the responsibility of organizations to better ensure cyber resilience themselves.

20.02.2024
How to Monitor & Stop Supply Chain Attacks
Supply chain attacks, increasingly prevalent and posing significant threats to IT security, target software or hardware suppliers to indirectly infiltrate organizations. Here are 5 ways to prevent these attacks with advanced monitoring technologies like machine learning-based Network Detection & Response (NDR) for early detection and mitigation.