ExeonTrace is a Network Detection and Response (NDR) platform that monitors network traffic to detect and respond to cyber threats. The solution analyzes network log data rather than using traffic mirroring, making it less resource-intensive and able to function with encrypted traffic since it focuses on metadata analysis instead of deep packet inspection. The platform provides three core capabilities: - Network visibility through intuitive visualizations and traffic mapping - Threat detection using machine learning algorithms to identify anomalies and attack patterns - Response capabilities with AI-driven threat scoring for rapid investigation ExeonTrace can be deployed without hardware sensors by leveraging existing network infrastructure components like switches and firewalls to export metadata. It's designed to work across both IT and OT networks, helping organizations identify vulnerabilities such as exposed services and shadow IT. Developed in Switzerland and based on research from ETH Zürich, the platform emphasizes privacy and compliance with regulations like NIS2. It's implemented and managed through global partners and can be integrated into existing security operations.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
WireGuard is a fast, simple, and secure VPN that uses cutting-edge cryptography, designed for ease of use and performance.
NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.
pfSense is a leading open source firewall and network security solution, providing advanced protection and connectivity options.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
A free DNS recursive service that blocks malicious host names and protects user privacy.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.