SYLink
Free diagnostic
Full catalog

Every SYLink product — 100% Made-in-France cybersecurity

25 products designed, built and operated in France. From plug-and-play SMB appliances to 10 Gbps DPI probes for critical operators, plus sovereign cyber AI and certifying training. One platform, one team, one jurisdiction.

Overview

Network and DPI probes — quick comparison

Gamme sondes et DPI — comparatif

Deux gammes complémentaires : les sondes SYLink pour la supervision réseau temps réel, et la gamme SYLink DPI pour l'analyse forensique avec rétention longue (compression 1:350).

Sondes SYLink (Box / Mini / Pro) — supervision réseau temps réel, stockage 1 an, NIDS et DLP. Gamme DPI (Mini / Pro) — analyse forensique avec rétention longue (compression 1:350), ciblée audit, OIV et défense. DPI VM — version virtualisée, capacité variable selon ressources hôtes ; la rétention se définit sur un stockage externe (NAS, SAN ou cloud souverain) dimensionné par le client.
Family Network

Network8 products

Firewalls, DPI probes and VPN — from plug-and-play SMB appliances to the 10 Gbps probe for critical operators.

SYLink Box
1 Gbps · flat network · plug-and-play

Compact 1 Gbps appliance pre-configured for self-employed professionals and small businesses. Deploys in 5 minutes on a flat network, no VLAN needed, with firewall, IDS/NIDS, probe and portal-driven management.

Use cases
  • Medical / paramedical practicePatient / visitor Wi-Fi / medical IoT segmentation, GDPR compliance, 24/7 supervision.
  • Accountant / law firmClient-data protection, alerts on intrusion attempts. For individual remote work, add SYLink VPN.
+ details
SYLink Mini
2.5 Gbps · 2,500 IPs · TLS decryption proxy

Mid-range appliance for SMBs and mid-market companies: 2.5 Gbps throughput, up to 2,500 IPs, with IDS, IPS, NIDS, firewall and a certificate-based decryption proxy to inspect internal encrypted flows.

Use cases
  • Multi-site industrial SMBOne Mini per site, central console, site-to-site VPN, OT/IT flow inspection.
  • Mid-market NIS2 complianceFull visibility on outbound flows, court-admissible event logging.
+ details
SYLink Pro
10 Gbps · firewall + DPI + IDS / NIDS + IPS + Proxy · 10,000 IPs

High-performance all-in-one appliance for large organizations: NGFW firewall, DPI probe, IDS / NIDS, IPS and TLS decryption proxy combined into a single 1U unit. 10 Gbps SFP+ or RJ45, up to 10,000 IPs, native multi-VLAN, air-gap mode for sensitive zones. Deployable in series, active/passive cluster, or active/active.

Use cases
  • Enterprise: replacing a foreign vendorReplacing a foreign cyber layer on the critical perimeter, integrating with the existing SOC.
  • Ministry / critical operator: air-gap LPMOn-premise air-gap deployment, cleared MCO/MCS, II 901 / IGI 1300 compliance.
+ details
SYLink DPI Mini
DPI probe 2.5 G · 15,000 IPs · 2 years of storage

Passive DPI probe (TAP/SPAN mode) for clinics, EPCIs and mid-size public bodies: 2.5 Gbps RJ45, up to 15,000 IPs, 2 years of compressed network traffic stored locally.

Use cases
  • Private clinicTime machine to reconstruct an incident on a medical IoT device, HDS compliance.
  • EPCI / mid-size townVisibility on pooled traffic, detection of citizen-data exfiltration attempts.
+ details
SYLink DPI Pro
DPI probe 10 G · 70,000 IPs · 5 years of storage

High-capacity passive DPI probe for hospitals, regions, critical operators and large groups: 10 Gbps SFP+ or RJ45, up to 70,000 IPs, 5 years of compressed storage. Multi-year forensic time machine.

Use cases
  • Critical operators (LPM)Main probe at the SI core, 5-year time machine, recurring NATO / Armed Forces audits.
  • Enterprise: foreign substitutionReplacing a foreign DPI probe with a sovereign solution, integrating with the internal SOC.
+ details
SYLink DPI VM
Virtualized DPI probe · VMware & Proxmox

Virtualized software DPI probe for VMware ESXi, Proxmox VE, KVM and Hyper-V. Ideal for pooled IT departments and hyper-converged datacenters where adding physical hardware is not an option.

Use cases
  • Pooled regional IT departmentDeployed on the IT department's hypervisor, captures east-west traffic between member-entity VMs.
  • Internal sovereign cloudVisibility on internal flows of your private cloud, with no extra hardware.
+ details
SYLink Protect
Self-hosted multi-protocol VPN · WireGuard / OpenVPN / IKEv2

Multi-protocol enterprise VPN platform (WireGuard, OpenVPN, IKEv2) self-hosted on your infrastructure. DNS filtering, distributed exit nodes, admin dashboard, deploys on Ubuntu in 5 minutes.

Use cases
  • Multi-customer ESNWhite-label VPN for your customers, exit nodes distributed at their sites, central supervision.
  • Ministry / critical operatorClassified VPN deployed in an air-gap zone, full control of nodes, no external dependency.
+ details
SYLink EDR
Endpoint Detection & Response · Windows / macOS / Linux

Sovereign EDR agent for endpoints and servers: Windows, Windows Server, macOS, Linux. Batch management, zero trust, automatic quarantine, anti-shadow-IT DLP. Deployable on-premise with no outbound telemetry.

Use cases
  • SMB NIS2 complianceEDR on every endpoint and server, court-admissible event log, SIEM integration.
  • Enterprise: replacing a foreign EDRSubstituting a US EDR with a sovereign solution that integrates into the existing SOC.
+ details
Family Audit

Audit4 products

Asset mapping, automated audits, AI-driven pentest and Windows event collection.

SYLink Activity
Windows Event ID collection · MSP-friendly

Lightweight agent that streams Windows Event IDs, user identifiers and system activity from endpoints to the MSP portal. Light, silent, GDPR-compliant.

Use cases
  • MSP supervising 50 SMBsUnified view of authentications and critical events across all customers from one console.
  • Early anti-ransomware detectionAlerting on typical ransomware patterns before encryption (suspicious process creation, etc.).
+ details
SYLink Audit
Internal, external, Wi-Fi & media audit · white-label reports

Automated cybersecurity audit platform. Internal, external, Wi-Fi, media, configuration and vulnerability audits. Reports auto-generated, fully customizable, white-label available — ideal for ESNs, integrators and public bodies.

Use cases
  • Gigalis Lot 2 ESN integratorRecurring audits for public bodies, white-label reports, attested PSSIE compliance.
  • SMB NIS2 onboardingMandatory annual audit, prioritized action plan, remediation tracking.
+ details
SYLink Vizu
On-premise CAASM · IT, IoT & OT unified

On-premise CAASM (Cyber Asset Attack Surface Management) solution that aggregates, in read-only mode, data from your existing tools (EDR, scanners, CMDB, DHCP, hypervisors, SIEM, MDM) to deliver a unified view of your IT, IoT and OT assets.

Use cases
  • Hospital: HDS compliance and medical-IoT inventoryDiscovery of connected medical devices, CVE tracking, remediation plan.
  • Enterprise: foreign-CAASM substitutionReplacing a US CAASM with a sovereign alternative integrable with the existing SI.
+ details
SYLink Pentest
AI-driven continuous pentesting · on-premise

AI-driven automated penetration-testing platform, executed on your own infrastructure (on-premise). A swarm of autonomous agents orchestrates reconnaissance, exploitation and proof-of-concept validation across your external and internal perimeters (AD, network, IoT, OT).

Use cases
  • Critical operators: continuous LPM pentestingPermanent monitoring of the exposed perimeter, compliance with recurring NATO / Armed Forces audits.
  • ESN: Gigalis Lot 2 serviceExternal pentests for public bodies, PASSI deliverables, white-label reports.
+ details
Family Threat Intel

Threat Intel4 products

Darkweb watch on your brand, your credentials, your executives.

SYLink Leaks
Darkweb watch · Basic 12, Enterprise 28, VIP 58 modules

Data-leak and exposure monitoring across the darkweb, surface web and criminal marketplaces. Three tiers based on your maturity: Basic (12 modules), Enterprise (28), VIP (58).

Use cases
  • SMB: credential leaks after a vendor breachDetect customer credentials exposed by a vendor compromise.
  • Enterprise: VIP protectionMonitoring of executives, deepfake detection, brand impersonation.
+ details
SYLink CTI
12 years · 30 PB/month · 12M+ IOCs · sovereign API

SYLink sovereign Cyber Threat Intelligence — 12 years of expertise operated from Clermont-Ferrand. 30 PB of network traffic analyzed every month across 1,200+ customer perimeters, 3 million attacks stopped each month. Live base of 12M+ IOCs, 334k+ CVEs monitored, 80+ MITRE ATT&CK techniques and 100k+ YARA / Sigma rules exposed via secure API (REST, Webhook, STIX/TAXII, MISP).

Use cases
  • Augmented SIEM triageYour SIEM raises 50,000 alerts/day. SYLink CTI enriches them with attacker context — your analysts focus on the 50 real threats.
  • Early detection of targeted campaignsA ransomware family appears on a leak site. Its IOCs are pushed in under 30 minutes to all your probes — defenses block it before impact.
+ details
SYLink Hornetbot
Enterprise honeypot · MTTD < 30 s · lateral-movement detection

The silent tripwire that fires when the attacker thinks they're invisible. SYLink Hornetbot is a self-hosted enterprise decoy deployed within minutes inside your LAN or server VLAN: it impersonates a legitimate Windows server (SMB shares, RDP, SSH, fake business apps) and alerts on the first scan, the first authentication attempt, the first write to a trapped share. No user has any legitimate reason to touch it — every interaction is a qualified attack signal.

Use cases
  • Multi-site town — detection of an annex compromiseA town of around 80,000 inhabitants deploys 3 Hornetbots (city hall, library, technical services). A library endpoint is compromised by an office-suite malware: 18 minutes after infection the local Hornetbot captures an SMB enumeration attempt from that endpoint — the attack is contained before reaching the central SI.
  • Law firm — RDP brute-force detected during business hoursA 120-person firm deploys a Hornetbot with a "backup server" persona (RDP only exposed internally). Mid-day, RDP attempts arrive from a user endpoint — the user has no reason to touch it. Compromised AD account isolated within the hour.
+ details
SYLink Browser
Your employees use AI. The SOC knows before the leak.

Enterprise browser extension for Firefox, Chrome and Edge. SYLink Browser detects, locally, leaks of credentials, secrets and sensitive data toward public generative-AI services, phishing, typosquatting and risky usage — without ever reading your content in clear. Only a SHA-256 hash and a binary "secret detected" flag reach the SOC. GDPR-compatible by design, DPIA and works-council notice delivered ready to sign.

Use cases
  • Law firm 80 staff — Shadow AI leakDeployed after a documented leak at a peer firm (excerpts of pleadings pasted into a public AI assistant). Month 1: 12 Shadow AI alerts including 3 with secrets (case numbers, IBANs). Month 6: under 1 alert / month. Behavior durably changed by the "Cancel / Send anyway" modal.
  • Mid-market finance dept 350 people — suspicious OAuth grantDetection of an abusive OAuth consent: an employee allowed a third-party plugin to read their work drive (accounting data). Without Browser, the data would have stayed accessible to the plugin's vendor for months. With Browser, alert the same day, revocation, training.
+ details
Family Mobility

Mobility4 products

Hardened workstations, biometric keys, roaming VPN, mobile supervision app.

SYLink SafeKey
Biometric USB · IP geoloc · remote wipe

Mobile digital safe: hardware-encrypted USB drive with biometric reader, IP-based geolocation via the connected host, and remote lock / wipe via the SYLink portal.

Use cases
  • Diplomacy: foreign travelCarrying sensitive data, immediate lock if lost or seized at customs.
  • Audit firm: client report deliveryPhysical delivery of confidential reports, full delivery traceability.
+ details
SYLink Spot
Hardened anonymized mobile workstation · SaaS portal

Hardened mobile workstation for business travel and roaming remote work: isolated OS, traffic anonymization, carrier compliance. Connected to the SYLink SaaS portal for supervision (not compatible with strict-sovereign government use cases requiring pure on-premise).

Use cases
  • Diplomatic delegations (non-classified)Traffic anonymization, remote supervision, fast reset.
  • Journalists / NGOsSource protection, operational anonymity, minimal data retention.
+ details
SYLink VPN
Turnkey VPN server · SMBs & mid-market

Turnkey VPN service for small organizations that want to give staff encrypted remote access without running a server. 10-minute setup, user profiles managed from the portal.

Use cases
  • SMB remote workStaff access the company's SaaS via an encrypted tunnel.
  • Liberal practice on the moveSecure connection from hotels, train stations, cafés.
+ details
SYLink Mobile
iOS / Android app · companion to Box, Mini & Pro

iOS and Android mobile app, companion to the SYLink Box, Mini and Pro appliances. Real-time alerts, supervision and VPN management, 360° view of your cyber from your smartphone.

Use cases
  • SMB ownerQuick view from the phone, alerts on incidents, hotline in one tap.
  • SMB CISONotifications on critical incidents even on the move, fast access to reports.
+ details
Family Exchange

Exchange2 products

Encrypted file sharing and sovereign e-signature, aligned with eIDAS and GDPR.

SYLink Transfer
Encrypted file sharing · 100% sovereign

Replaces WeTransfer, SwissTransfer and Dropbox Transfer with an end-to-end encrypted channel hosted in France. No extra-European actor can access the content — not even SYLink. Built for lawyers, accountants, consulting firms and MSPs that exchange sensitive documents.

Use cases
  • Law firmExchange of sensitive documents with clients and peers, mandatory NDA, court-admissible audit if disputed.
  • AccountantTax statements and returns shared with executives, 7-day expiration, password sent via separate channel.
+ details
SYLink Sign
Sovereign electronic signature · eIDAS

100% French electronic-signature platform, aligned on the eIDAS regulation. Simple, advanced and qualified signatures. Court-admissible archiving, sovereign hosting, GDPR-compliant. Replaces DocuSign, Adobe Sign and Yousign with no extra-European dependency.

Use cases
  • HR departmentJob offers, employment contracts, amendments, termination paperwork — advanced signature, 10-year archiving.
  • Sales departmentPurchase orders, accepted quotes, customer contracts — Salesforce/HubSpot CRM connector, automatic reminders.
+ details
Family Supervision

Supervision2 products

Multi-tenant console, 24/7 supervision, cleared MCO/MCS.

SYLink NOC
24/7 Network Operations Center · multi-site · MTTR < 30 min

Our Network Operations Center continuously supervises your customers' network quality of service: availability, latency, jitter, packet loss, WAN saturation, flow anomalies. 24/7/365 on-call by analysts based in Clermont-Ferrand. Dedicated dashboard, contractual SLAs, average MTTR < 30 minutes. Multi-site, multi-tenant deployment for MSPs.

Use cases
  • MSP supervising 80 retail storesPooled NOC for the entire fleet, real-time visibility on every store, fast intervention on outage.
  • Multi-site hospitalCritical care continuity, alerting on link saturation between sites, SLAs aligned with the medical-business plan.
+ details
SYLink SOC
Sovereign AI SOC · UniSOC · DPI + EDR + SYLink AI · 24/7

Our sovereign Security Operations Center, operated under the UniSOC brand from Clermont-Ferrand. Combines DPI probe, EDR agent and SYLink AI on-premise LLM (Ollama, Blackwell GPU). 24/7 multi-source detection, MTTD < 5 minutes for the covered MITRE techniques, HDS V2 hosting at Unitel Marseille — zero outbound queries. NIS2-, GDPR-, PSSIE-compliant.

Use cases
  • Hospital — care continuityDetection and response on critical perimeters, HDS-compliant logging, blocking that respects medical priorities.
  • Critical operators — LPM complianceOn-premise SOC with cleared MCO/MCS, NATO / Armed Forces audits, integration with CERT-FR.
+ details
Family Training

Training1 product

Cybersecurity awareness and training — 4 certifying levels.

SYLink Learn
Certifying cyber training · 4 levels · groups of 15

Online and on-site cybersecurity awareness solution. Four certifying modules, from rank-and-file employees to network administrators, delivered in groups of up to 15 people. Security is a collective effort — every employee becomes an active link in your defense.

Use cases
  • SMB — mandatory annual N1 cycle1 hour per employee per year, phishing simulation, personalized completion certificate.
  • Mid-market — progressive plan N1 → N3Awareness for everyone, then specialized N2/N3 for the IT team. Cost amortized over 18 months.
+ details

Need help putting your stack together?

Describe your context (size, sector, regulatory constraints) and our architects send you the most relevant product combination within 48 hours.