Act before it is too late!

Introducing our cutting-edge cybersecurity software, distributed by our team at Swiss LabConsulting. The continuous monitoring of the dark web, and other unique features are just a few of the reasons of why this software stands out. This is not just another security solution; it’s a proactive guardian of your digital assets.

Our software offers continuous monitoring of your attack surface to pinpoint risks, high-impact vulnerabilities, and external threats in real-time. With its advanced threat detection capabilities, it goes beyond traditional security measures to provide a comprehensive shield for your critical data and systems. We understand the ever-evolving landscape of cybersecurity, and our software is built to adapt and safeguard your organization’s digital ecosystem. Trust Swiss LabConsulting to fortify your defenses and stay one step ahead in the ever-present battle against cyber threats. Your security is our priority.

Our Products

Networked assets inventories
Preparation of inventories of networked, switched-on assets, with analysis of their vulnerabilities.​Ocelot, an advanced network analysis and scanning device designed to identify vulnerabilities and bad configurations within a computer network and subsequently generate a report containing:
  • an inventory of infrastructures
  • an inventory of installed softwares
  • a list of vulnerabilities with detected recommendations
The device is easy to install and does not generate impacts on the corporate network. 

Framework defense against browsing to malicious sites

Based on valuable feeds and AI algorithms validated on various datasets and field tested over the past 2 years. It protects your company from phishing attacks almost completely.​

Most companies need free access to web and online resources.​Web sites regularly change their names to escape the radar of monitoring solutions.​Websites are often home to phishing, scams, gambling, malware hosting, and other fraudulent content, which exposes an enterprise to security risks on a daily basis. In addition, much of the enterprise IT and OT infrastructure operates in an unattended mode. The EXYS5100-SECURE-DNS service can detect and mitigate such risks through a customized DNS server that relies on a high-performance database, updated daily, containing “wrong domains” from its own and other trusted sources.
  • Daily collection of malicious domains from multiple sources

  • Flexible, dynamic and customized blacklisting and whitelisting capabilities

  • Customer-oriented filtering that can be configured according to user needs/requirements

  • DGA (Domain Generation Algorithm) detection using NLP (Natural Language Processing) techniques

  • Detection of the first request to a faulty domain

  • Continuous search for artificial intelligence-based techniques for improved classification

  • Availability of an intelligence database (wrong IPs, wrong URLs, faulty Subnets,…)

  • Daily reports that include client locations and IP range

  • Ability to provide detailed feedback with risk indicators and recommendations

  • Easy configuration on the customer’s network and immediate security level

High-level multiprotocol gateway

Family of high-security multiprotocol gateways adaptable to the deployment and network protection of specific infrastructures that are not fully secure and cannot be extended since they are certified (e.g., certified analysis machinery based on HTTP communication protocol and not HTTPS).​

EXYS9200-SNG is an intelligent multiprotocol gateway with applications in Home Automation, e-Health, Robotics (ROS) and IoT. Its key features include support for the latest home automation communication protocols (Z-Wave, Bluetooth, ZigBee, RF-ID, NFC), a wide range of data communication technologies, wired and wireless (Wi-Fi, Ethernet, USB), a security by design architecture, a local and advanced semantic database, AI algorithm processing capabilities, intuitive and easy-to-use remote Web-based configuration software, and user interface.

 

  • Based on a high-performance, state-of-the-art embedded platform

  • Hybrid technology, aimed at applications in Home Automation, e-Health and IoT

  • Fully compatible with ROS (Robot Operating System)

  • LAN, WAN, USB, Wi-Fi, 3G and 4G mobile, LoRa connectivity

  • Integration of local semantic database enhanced by machine learning/AI algorithms

  • Communication with own servers and cloud storage. Forwarding to customers’ data storage systems

  • Flexible modular architecture, allowing new modules and hardware/software services to be added

  • Application of security principles by design. Anti-cloning and anti-tampering protection

  • Secure data communication (VPN). Authentication, privacy and encryption. GDPR compliance

  • Web-based unified management user interface; locally (from the gateway) or remotely (from the system portal)

Infrastructure protection from cyber attacks

Infrastructure protection by collecting and analyzing all traffic and events from on premise and cloud infrastructures (e.g., Microsoft Azure/Entra). The system makes use of Eclexys’ thread intelligence databases.​

Kondra is a security monitoring solution that seamlessly integrates Security Information and Event Management (SIEM) and Network Security Monitoring (NSM) capabilities, providing organizations with a robust mechanism for anomaly detection and defense against potential cyber threats. The KONDRA solution seamlessly integrates with the Secure DNS service and provides real-time protection against phishing attacks by preventing browsing to malicious web services.

  • Ability to aggregate and analyze different data sets from various sources
  • Availability of Microsoft Windows event logs
  • Information about PowerShell scripts and commands executed on servers or destination nodes in the customer’s infrastructure
  • Information on process creation, network connections, file creation, driver loading, log events
  • Comprehensive information on Active Directory
  • Monitoring interfaces on different network packets
  • Collection of intrusion detection system (IDS) alerts generated by network traffic
  • Firewall activity monitoring and data logs
  • Logs on Microsoft MS365 message management and trace activities
  • Cloud computing platforms and services such as Microsoft Azure
  • Monitoring of data from industrial control systems
  • Data and logs from other ad hoc services
  • Monitoring of various network protocols (HTTP,SSL,SSH, PSR, DCE_RPC, FTP, SOCKS, RADIUS, SMTP, SNMP, SIP, SMB, NTLM, Kerberos)

 

 

EXYS7950-KONDRA

By collecting, analyzing, and correlating data from different sources, the proposed solution strengthens an organization’s level of security by providing proactive threat detection, incident response, and a comprehensive view of the entire ICT landscape, encompassing both on-premise and cloud environments. The solution can also be used in a multiple-site architecture, enabling centralized data collection and analysis.

 
 
 

AI

Artificial Intelligence is used to comprehend what makes an external asset of yours, looking beyond known servers, networks, and IPs, typically unveiling 30%-50% more resources than an organization is aware of owning

 
 

Deeper

It offers a high-level overview of the evolution of the attack surface and associated risks. It presents trends in key metrics, such as the types of detected risks and their criticality, aiding in priority determination

 
 

Always Connected

Findings are communicated to the core system and the system administrator for proper actions

 
 

Mapping

Gain real-time insight into the most significant and impactful attack routes within your organization using this groundbreaking approach. It ensures uninterrupted visibility into your data’s vulnerable and valuable pathways, no matter where they are located

 
 

Simulations

AI-generated social engineering attacks are simulated to identify weak links in the systems

 
 

Training

Training courses are essential for a strong system

 
 
Swiss LabConsulting Sagl
Address:
Via Cantonale 61, 6983 Magliaso, Switzerland