CISO Challenge #11
I can’t do traffic mirroring in my own or my outsourcer’s network
If parts or even the complete network operation is outsourced to a third-party, it becomes increasingly challenging to monitor the whole perimeter.
Exeon’s approach
- The network log data, which ExeonTrace relies on, can be easily exported by the outsourcer
- Data can then be analysed by ExeonTrace’s algorithms
Benefits for CISOs and security teams
- Regain sovereignty over network activities – even if the operations are outsourced
- Complete visibility also into outsourced parts of your network
Why Global Organizations Love ExeonTrace
Comprehensive Visibility
Visibility into your entire IT/OT network and all its interfaces to identify vulnerabilities (exposed services, shadow IT etc.) and malicious attack patterns in real-time.
Unaffected by Encryption
Algorithms are unaffected by encrypted payloads since they are built to detect attack patterns based on metadata and not deep packet inspection.
Light-weight Log Data
Analysis of light-weight network log data instead of data-heavy traffic mirroring. Metadata can be exported from existing network sources (switches, firewalls etc.) without hardware sensors.
100% Swiss
As an established Swiss NDR solution, based on a decade of research at ETH Zürich, we maintain a high level of innovation and privacy, which is incorporated in our ExeonTrace platform.