The suite of products by Eclexys will protect your company from dangerous outgoing traffic (EXYS-DNS), from malicious cyber-attacks (EXYS-EFS) and detect block internal malicious activity (EXYS-MDR)


The network of your company could be infected if it connects to a malicious domain. With EXYS-DNS, we control the outgoing traffic through DNS (domain name system), checking domains badness (b-score) and novelty (n-score). Thanks to our AI-algorithms and corporate intelligence datasets, we can prevent connections generated by browsers, email clients, IoT devices, or other digital assets towards malicious domains. EXYS-DNS is installed and corporate security improved in just a few minutes.


With EXYS-MDR we can inspect the internal traffic – on premise and cloud-based – of your company and identify malicious activity as well as generic anomalies or misconfigurations. The solution combines SIEM (Security Information and Event Management) with DPI (Deep Packet Inspection) and NDR (Network Detection and Response). If a threat actor penetrates your network, we can detect its activity (discovery, infection spreading, lateral movements). A ransomware attack, for instance, will promptly be intercepted and notified in order to prevent the infection of other machines or hot backups. Our Managed Detection and Response (MDR) solution can be delivered as a virtual machine or as a bare-metal server. The direct connection to our intelligence platform guarantees real time threat detection capability.


Eclexys Extended Firewalling System (EXYS-EFS), is the third key element for the increased security of your enterprise. Modular, scalable, and configurable to each customer’s need, it guarantees protection against a broad range of network threats, vulnerabilities and exploits, including SQL or code injection, cross-site scripting, denial of service attacks, trojans, viruses, worms, spyware, and many other threats. The EXYS-EFS perfectly answers the needs of customers willing to have a clear picture of external attacks to their corporate perimeter. The product can also be appreciated for its shielding function to protect non-secured infrastructures such as Industrial Control Systems (ICS), Medical Devices (MD). The product is available in several form factors and can be deployed across multiple physical locations as well as in Microsoft Azure, AWS, and Google Cloud Platform.

*All products are 100% Swiss made, developed, deeply tested, and maintained by Eclexys experienced team of threat intelligence engineers and analysts. A network of selected distributors guarantees on-site deployment, instruction and local support.


“The services offered by Eclexys consist in a suite of security and exposure assessments (EXYS-SEA), a dedicated suite of cyber threat intelligence solutions (EXYS-CTI) and a tailored cybersecurity training program (EXYS-TRN)”


Every strategy in cybersecurity should start with an assessment of the current situation. With EXYS-SEA we provide the elements to understand your cyber security posture, the related level of maturity along with a risk matrix, and we propose concrete steps to improve it. In addition, EXYS-SEA can be supplemented with the planning of a cyber security strategy compliant with international standards, penetration tests and bug bounty programs. As part of the EXYS-SEA suite, Eclexys also offers a third-party verification service, should a company need to assess the “cybersecurity health” of its partners, suppliers or investors.

Last but not least, the EXYS-SEA service is appreciated by companies and institutions willing to check and correct their compliancy to privacy regulations such as GDPR and the Swiss data protection law (LPD) which will enter into force on 1 September 2023.


Cyber Threat Intelligence (CTI) has become a key element in enterprise security. While products on the market generally address perimeter and internal network security, CTI is concerned with looking outside the perimeter. This enables anticipation of possible attacks by providing technical and strategic insights to both management and security officers. EXYS-CTI is a comprehensive suite of services: from access to a Threat Portal with reports on new attack techniques and criminal or state actors operating in the digital world, to the provision of Indicators of Compromise (IoCs) and YARA rules to anticipate or identify attacks. And access to the pro version of Abayot**, a platform for analyzing IPs, domains, malicious code and potentially dangerous documents. The intelligence platform at Eclexys is fed with a worldwide network own threat intel sensors as well as with third party datasets.


Eclexys, having its roots in academia and threat intelligence, has years of experience in training of every kind and level of end users. Eclexys’ trainings (EXYS-TRN) target management (executive strategic trainings), employees (cybersecurity awareness), as well as IT and OT professionals, threat analysts or SOC operators. The training programs span form few hours, to several days and cover a very wide range of topics relating to the digitalization processes and cybersecurity and cybercrime. An exhaustive list of arguments can be made available upon request.

**Abayot is an Eclexys trademark. An open version of the platform is available at abayot.space.



Phone: +41 91 600 00 00
Email: office@eclexys.com

Via dell’Inglese 6
CH-6826 Riva San Vitale

Get a quote