WYBOT Probe
WYBOT Probe
Intrusion and vulnerability detection
SYSUN Cybersécurité, a recognised French network security company, offers a solution to supervise vulnerabilities and detect cyberthreats.
It is aimed at all companies and administrations, regardless of size, who need to secure a network, both in terms of equipment and traffic.
Each year, around 18,000 vulnerabilities are discovered. This number is constantly rising, ramping up the risk of attacks against your network.
How many vulnerabilities do you manage to handle each day?
How many threats are currently found in your system?
Which types of threats can you identify?
Leaving them in place means giving cybercriminals the keys to access your information system and data.
It is a real challenge to easily identify the most serious loopholes and detect the most advanced threats before they compromise your organisation
Processing power combining 8 engines
Thanks to its combination of eight engines, WYBOT detects vulnerabilities and cyberthreats where other security systems like firewalls fail to block them.
NDPI
- File Storing
- Application and network protocol classification
Vulnerability scoring
- CVE – CVSS – NVD
- OT detection
- Indicator of compromise (IOC)
Signature-based detection
- Pattern matching analysis
- Polymorphic analysis
Reputation analysis
- Performance measurement
- Key Indicator
NBA
- PC behavioural analysis
- Connection and network analysis
Protocol analysis
- IPS
- IDS
- Up to layer 7 of the OSI model
Yara
- Signature-based detection
- Heuristic rules
Sandbox
- Smart HASH
- Scoring
100% of traffic analysed in real time
The ultra-effective WYBOT system continually analyses 100% of traffic and 100% of machines connected to the network, 24/7.
It delivers statistics and reports that are crucial for managing your security, and an email and SMS alert is sent when a cyberthreat is detected.
Network anomalies
Network anomalies
- CVE detection
- PC health check
- Network intrusions
Network applications
Network applications
- Controlling inbound and outbound traffic
- Verifying protocols
Monitoring
Monitoring
- Reports
- Statistics
- Mapping
DNS queries
DNS queries
- Domain name detection
- Blacklist checks
Bandwidth use
Bandwidth use
- Real-time bandwidth control
SMS & email alerts
SMS & email alerts
- SMS and emails sent in the event of an attack

The benefits:
Plug & Play installation (under 5 minutes)
Available as appliance or SaaS
From 1 to 10,000 devices monitored
Technical support included
Interested in a demo?
Contact our experts!