Intrusion and vulnerability detection

SYSUN Cybersécurité, a recognised French network security company, offers a solution to supervise vulnerabilities and detect cyberthreats.

It is aimed at all companies and administrations, regardless of size, who need to secure a network, both in terms of equipment and traffic.

Each year, around 18,000 vulnerabilities are discovered. This number is constantly rising, ramping up the risk of attacks against your network.

How many vulnerabilities do you manage to handle each day?
How many threats are currently found in your system?
Which types of threats can you identify?

Leaving them in place means giving cybercriminals the keys to access your information system and data.

It is a real challenge to easily identify the most serious loopholes and detect the most advanced threats before they compromise your organisation

Processing power combining 8 engines


Thanks to its combination of eight engines, WYBOT detects vulnerabilities and cyberthreats where other security systems like firewalls fail to block them.


  • File Storing
  • Application and network protocol classification

Vulnerability scoring

  • CVE – CVSS – NVD
  • OT detection
  • Indicator of compromise (IOC)

Signature-based detection

  • Pattern matching analysis
  • Polymorphic analysis

Reputation analysis

  • Performance measurement
  • Key Indicator


  • PC behavioural analysis
  • Connection and network analysis

Protocol analysis

  • IPS
  • IDS
  • Up to layer 7 of the OSI model


  • Signature-based detection
  • Heuristic rules


  • Smart HASH
  • Scoring

100% of traffic analysed in real time


The ultra-effective WYBOT system continually analyses 100% of traffic and 100% of machines connected to the network, 24/7.

It delivers statistics and reports that are crucial for managing your security, and an email and SMS alert is sent when a cyberthreat is detected.

Network anomalies

Network anomalies

  • CVE detection
  • PC health check
  • Network intrusions

Network applications

Network applications

  • Controlling inbound and outbound traffic
  • Verifying protocols



  • Reports
  • Statistics
  • Mapping

DNS queries

DNS queries

  • Domain name detection
  • Blacklist checks

Bandwidth use

Bandwidth use

  • Real-time bandwidth control

SMS & email alerts

SMS & email alerts

  • SMS and emails sent in the event of an attack

The benefits:

Plug & Play installation (under 5 minutes)

Available as appliance or SaaS

From 1 to 10,000 devices monitored

Technical support included

Interested in a demo?

Contact our experts!