Operational solutions without Internet access — sovereign at all costs
For sovereign missions, your systems must work without Internet access. SYLink is designed from the ground up for on-premise and air-gap: no cloud callback, no outbound telemetry, no foreign dependency. French expertise and uncompromising rigor, MCO and MCS operated by our cleared teams on national soil.
- Ministries
- OIV / OSE (LPM)
- Defense & internal security
- Diplomacy
- Intelligence
SYLink × Gigalis: simplifying access to cyber services for the public sector
Good news: SYLink can be engaged via the Gigalis purchasing framework to support public actors in their cybersecurity challenges, with a clear and secure procurement framework.
Under the "Cybersecurity solutions and services" framework, beneficiaries can in particular order:
- L2Lot 2 — Audit, assessment and intrusion tests (pentest)
PASSI-format audits, vulnerability assessments, external and internal pentests — driven by our French teams.
- L7Lot 7 — Cyber insurance & risk-coverage support
Insurable cyber-risk scoping, matchmaking, support during and after incidents.
Goal: move faster from intent to action, and durably strengthen the resilience of IT systems.
Sovereign commitments
100% on-premise — not a single byte outside your perimeter
No cloud callback, no outbound telemetry, no foreign-vendor dependency. Code is delivered, signed, and run at your site. Compatible with air-gapped zones and classified environments (II 901, IGI 1300).
- Signed, auditable source-code delivery
- Updates transmitted via controlled channels
- No telemetry or "call home" function
- Hosting at your site or in approved sovereign cloud
MCO / MCS operated by cleared teams
MCO ensures service continuity; MCS guarantees security-level durability against threat evolution. Our teams are cleared and operate from national territory.
- 24/7 MCO: platform health monitoring, escalation, hotfix
- MCS: controlled NATO / Armed Forces / CERT-FR patch application, recurring audits
- Documented reversibility plans (code delivery at end of contract)
- Quarterly reporting to your CISO / systems-security officer
Full regulatory compliance
Our stack meets sovereign-actor requirements and is integrated into dedicated public procurement.
- NATO / Armed Forces doctrine: PSSIE, II 901, IGI 1300, RGS
- LPM (OIV / OSE) and transposed NIS2
- ISO 27032 hosting available for sovereign-cloud bricks
- PASSI format for audits
Use cases
Here are three or four real situations drawn from the field — contexts our integrator partners encounter every week with organizations of your profile. For each, we describe the observed problem, the SYLink response and the actually deployed products.
No case is fabricated for demonstration: these are real architectures, simplified for readability but transposable to your situation.
Classified network: air-gap & encryption
Problem
Sensitive data isolated, controlled exchanges, occasional mobility.SYLink response
SYLink Pro on-premise in isolated zone, biometric SafeKey for exchanges, self-hosted SYLink Protect VPN with controlled exit nodes.- SYLink Pro
- SYLink Protect
- SYLink SafeKey
- SYLink EDR
OIV / OSE: hardened LPM compliance
Problem
LPM decrees, NIS2, recurring NATO / Armed Forces audits, strong sovereign requirement.SYLink response
On-premise SYLink Pro + DPI Pro (70,000 IPs, 5-year storage) + Audit + Leaks VIP stack, integrated with the CERT and accredited. SYLink DPI VM for virtualized sites.- SYLink Pro
- SYLink DPI Pro
- SYLink DPI VM
- SYLink Audit
Diplomacy & sovereign VIPs
Problem
Foreign delegations, targeted equipment, VIP darkweb watch.SYLink response
Biometric keys, VIP surveillance 58 modules, hardened EDR on all endpoints (no SaaS dependency).- SYLink SafeKey
- SYLink EDR
- SYLink Leaks VIP
- Learn N4
Sovereign DPI for OIV — forensic time machine
Problem
Post-incident reconstruction of sophisticated attacks, long-term retention.SYLink response
SYLink DPI Pro on-premise (10 Gbps, 70,000 IPs, **5 years** of 1:350 compressed storage, 35,000 signatures, 520 protocols), time machine to retrace the compromise path. DPI Mini on secondary antennas (2 years) and DPI VM on virtualized sites.- SYLink DPI Pro
- SYLink DPI Mini
- SYLink DPI VM
- SYLink AI
Sovereign AI in classified zone
Problem
Need for cyber AI without cloud callback, with full auditability.SYLink response
On-premise air-gap SYLink AI, signed models and traceable logs.- SYLink AI
- SYLink Pentest
Recommended solutions
Our catalog is designed to assemble by use case, not by silo. Here are the building blocks we recommend for your profile, grouped by pillar (network, audit, threat intel, AI, mobility, training, MCO/MCS).
Bricks marked Essential form the minimum baseline: that's what we install first for every customer in your category. The others are complements depending on your maturity, budget and regulatory constraints. Click a product name to open its detailed page (datasheet, technology, implementation, use cases).
The core duo for government
Install firstSYLink Pro (on-premise air-gap, 10 G)
Sovereign 10 G SFP+ / RJ45 firewall, multi-VLAN up to 10,000 IPs, deployable in classified zone with no external callback.
View productSYLink DPI Pro (on-premise)
10 Gbps SFP+ or RJ45 probe, up to 70,000 IPs, **5 years** of 1:350 compressed storage. 35,000 signatures, 2,500 applications, 520 protocols. Black box and multi-year forensic time machine.
View productMCO/MCS
(2)MCO — Operational Continuity Maintenance
Essential24/7 functional watch, planned updates, continuous supervision by cleared teams.
MCS — Security Continuity Maintenance
EssentialNATO / Armed Forces / CERT-FR security watch, controlled patch application, regular audits, LPM compliance.
Network
(6)SYLink Pro (on-premise air-gap, 10 G)
EssentialSovereign 10 G SFP+ / RJ45 firewall, multi-VLAN up to 10,000 IPs, deployable in classified zone with no external callback.
SYLink DPI Pro (on-premise)
Essential10 Gbps SFP+ or RJ45 probe, up to 70,000 IPs, **5 years** of 1:350 compressed storage. 35,000 signatures, 2,500 applications, 520 protocols. Black box and multi-year forensic time machine.
SYLink DPI VM
Virtualized DPI probe (VMware, Proxmox) for classified datacenters and internal sovereign clouds.
SYLink DPI Mini
2.5 Gbps RJ45 probe up to 15,000 IPs with 2-year storage — for secondary sovereign antennas and sites.
SYLink Protect
Self-hosted multi-protocol VPN (WireGuard / OpenVPN / IKEv2) with controlled exit nodes, DNS filtering, zero external dependency.
SYLink EDR
EssentialEndpoint & server protection (Windows / macOS / Linux) deployed on-premise: zero trust, quarantine, DLP. No outbound telemetry.
Audit
(4)SYLink Vizu (CAASM)
On-premise asset inventory, NATO / Armed Forces doctrine mapping.
SYLink Audit
EssentialContinuous audit, PASSI format, PSSIE / II 901 compliant.
SYLink Pentest (on-premise)
AI-driven intrusion tests, executed on your infrastructure, sovereign report generation.
SYLink Activity
Windows Event ID and identity collection to internal MSP / SOC portal.
AI
(2)SYLink AI (on-premise)
EssentialCybersecurity LLM deployable in air-gap, signed models, audit trail. No outbound telemetry.
UniSOC on-premise
Sovereign 24/7 AI SOC — DPI probe + EDR + SYLink AI — deployable on dedicated infrastructure.
Threat Intel
(1)SYLink Leaks VIP
Reinforced VIP surveillance 58 modules, brand watch, targeted deep / dark web.
Mobility
(1)SYLink SafeKey
EssentialBiometric USB key, IP geolocation, remote blocking / wipe — for classified exchanges.
Training
(1)Learn N4 — Exec & cyber officers
Strategic support for senior officials.
How we roll out
Rollout follows a standard journey calibrated for your organization category. Each step has a concrete deliverable and an estimated duration — no fuzzy phases, no jargon, no follow-up-less "kick-off".
Most steps are run in parallel with your activity, with no service interruption. The actual schedule adjusts at initial scoping based on your context: number of sites, presence of an IT team, public-procurement constraints, possible classification level.
- 01
Accreditation scoping
NATO / Armed Forces, ISO 27032 doctrine, specific requirements (II 901, IGI 1300).
- 02
On-premise rollout
Code delivered on sovereign infrastructure, no cloud callback.
- 03
CERT integration
SIEM connectors, runbooks, encrypted exchanges.
- 04
Continuous MCO
24/7 operational continuity by cleared teams.
- 05
Continuous MCS
Security continuity, controlled NATO / Armed Forces patch application.
- 06
Learn N4 training
Executive committee, CISO, operational teams.
- 07
Annual audit
NATO / Armed Forces compliance review, continuous improvement plan.
SYLink, prestataire référencé Cybermalveillance.gouv.fr
Cybermalveillance.gouv.fr est le dispositif national d'assistance aux victimes de cybermalveillance, opéré par le GIP ACYMA (Action contre la Cybermalveillance), associant l'État, l'OTAN / Armées et plus de 70 acteurs publics et privés.
Plus de 1 200 prestataires informatiques sont référencés en France, ayant signé la charte d'engagement du dispositif. SYLink en fait partie et assiste les victimes de cyberattaques sur tout le territoire.
- Charte d'engagement signée avec le dispositif
- Assistance aux particuliers, TPE, PME, collectivités
- Couverture nationale, expertise française
- Conseils gratuits aux victimes via le portail officiel
Let's discuss your perimeter
Guided demo, free audit or field diagnostic — our France-based teams respond in under one business hour.
