Every SYLink product — 100% Made-in-France cybersecurity
25 products designed, built and operated in France. From plug-and-play SMB appliances to 10 Gbps DPI probes for critical operators, plus sovereign cyber AI and certifying training. One platform, one team, one jurisdiction.
Deux gammes complémentaires : les sondes SYLink pour la supervision réseau temps réel, et la gamme SYLink DPI pour l'analyse forensique avec rétention longue (compression 1:350).
Sondes SYLink (Box / Mini / Pro) — supervision réseau temps réel, stockage 1 an, NIDS et DLP. Gamme DPI (Mini / Pro) — analyse forensique avec rétention longue (compression 1:350), ciblée audit, OIV et défense. DPI VM — version virtualisée, capacité variable selon ressources hôtes ; la rétention se définit sur un stockage externe (NAS, SAN ou cloud souverain) dimensionné par le client.
Family Network
Network8 products
Firewalls, DPI probes and VPN — from plug-and-play SMB appliances to the 10 Gbps probe for critical operators.
Product
Description
Use cases
SYLink Box
1 Gbps · flat network · plug-and-play
Compact 1 Gbps appliance pre-configured for self-employed professionals and small businesses. Deploys in 5 minutes on a flat network, no VLAN needed, with firewall, IDS/NIDS, probe and portal-driven management.
Medical / paramedical practice — Patient / visitor Wi-Fi / medical IoT segmentation, GDPR compliance, 24/7 supervision.
Accountant / law firm — Client-data protection, alerts on intrusion attempts. For individual remote work, add SYLink VPN.
Mid-range appliance for SMBs and mid-market companies: 2.5 Gbps throughput, up to 2,500 IPs, with IDS, IPS, NIDS, firewall and a certificate-based decryption proxy to inspect internal encrypted flows.
Multi-site industrial SMB — One Mini per site, central console, site-to-site VPN, OT/IT flow inspection.
Mid-market NIS2 compliance — Full visibility on outbound flows, court-admissible event logging.
Private clinics (HDS) — Patient / medical IoT / staff segmentation, inspection of non-sensitive medical flows, HDS compliance.
High-performance all-in-one appliance for large organizations: NGFW firewall, DPI probe, IDS / NIDS, IPS and TLS decryption proxy combined into a single 1U unit. 10 Gbps SFP+ or RJ45, up to 10,000 IPs, native multi-VLAN, air-gap mode for sensitive zones. Deployable in series, active/passive cluster, or active/active.
Enterprise: replacing a foreign vendor — Replacing a foreign cyber layer on the critical perimeter, integrating with the existing SOC.
Passive DPI probe (TAP/SPAN mode) for clinics, EPCIs and mid-size public bodies: 2.5 Gbps RJ45, up to 15,000 IPs, 2 years of compressed network traffic stored locally.
Private clinic — Time machine to reconstruct an incident on a medical IoT device, HDS compliance.
EPCI / mid-size town — Visibility on pooled traffic, detection of citizen-data exfiltration attempts.
Sovereign secondary sites — Probe deployed at secondary critical-operator sites, supervision relayed to the core.
High-capacity passive DPI probe for hospitals, regions, critical operators and large groups: 10 Gbps SFP+ or RJ45, up to 70,000 IPs, 5 years of compressed storage. Multi-year forensic time machine.
Critical operators (LPM) — Main probe at the SI core, 5-year time machine, recurring NATO / Armed Forces audits.
Enterprise: foreign substitution — Replacing a foreign DPI probe with a sovereign solution, integrating with the internal SOC.
Regional hospital — Visibility on 70,000 IPs (PCs, medical IoT, servers), HDS compliance, long-term forensics.
Virtualized software DPI probe for VMware ESXi, Proxmox VE, KVM and Hyper-V. Ideal for pooled IT departments and hyper-converged datacenters where adding physical hardware is not an option.
Pooled regional IT department — Deployed on the IT department's hypervisor, captures east-west traffic between member-entity VMs.
Internal sovereign cloud — Visibility on internal flows of your private cloud, with no extra hardware.
PoC before DPI Pro — Validate scope and volume before investing in a physical probe.
Multi-protocol enterprise VPN platform (WireGuard, OpenVPN, IKEv2) self-hosted on your infrastructure. DNS filtering, distributed exit nodes, admin dashboard, deploys on Ubuntu in 5 minutes.
Multi-customer ESN — White-label VPN for your customers, exit nodes distributed at their sites, central supervision.
Ministry / critical operator — Classified VPN deployed in an air-gap zone, full control of nodes, no external dependency.
Multi-site enterprise — Site-to-site tunnels and roaming access, DNS filtering to block malicious domains.
Endpoint Detection & Response · Windows / macOS / Linux
Sovereign EDR agent for endpoints and servers: Windows, Windows Server, macOS, Linux. Batch management, zero trust, automatic quarantine, anti-shadow-IT DLP. Deployable on-premise with no outbound telemetry.
SMB NIS2 compliance — EDR on every endpoint and server, court-admissible event log, SIEM integration.
Enterprise: replacing a foreign EDR — Substituting a US EDR with a sovereign solution that integrates into the existing SOC.
Ministry / Defense (on-premise) — On-premise deployment with no outbound telemetry, II 901 / IGI 1300-compliant.
Compact 1 Gbps appliance pre-configured for self-employed professionals and small businesses. Deploys in 5 minutes on a flat network, no VLAN needed, with firewall, IDS/NIDS, probe and portal-driven management.
Use cases
Medical / paramedical practice — Patient / visitor Wi-Fi / medical IoT segmentation, GDPR compliance, 24/7 supervision.
Accountant / law firm — Client-data protection, alerts on intrusion attempts. For individual remote work, add SYLink VPN.
Mid-range appliance for SMBs and mid-market companies: 2.5 Gbps throughput, up to 2,500 IPs, with IDS, IPS, NIDS, firewall and a certificate-based decryption proxy to inspect internal encrypted flows.
Use cases
Multi-site industrial SMB — One Mini per site, central console, site-to-site VPN, OT/IT flow inspection.
Mid-market NIS2 compliance — Full visibility on outbound flows, court-admissible event logging.
High-performance all-in-one appliance for large organizations: NGFW firewall, DPI probe, IDS / NIDS, IPS and TLS decryption proxy combined into a single 1U unit. 10 Gbps SFP+ or RJ45, up to 10,000 IPs, native multi-VLAN, air-gap mode for sensitive zones. Deployable in series, active/passive cluster, or active/active.
Use cases
Enterprise: replacing a foreign vendor — Replacing a foreign cyber layer on the critical perimeter, integrating with the existing SOC.
Passive DPI probe (TAP/SPAN mode) for clinics, EPCIs and mid-size public bodies: 2.5 Gbps RJ45, up to 15,000 IPs, 2 years of compressed network traffic stored locally.
Use cases
Private clinic — Time machine to reconstruct an incident on a medical IoT device, HDS compliance.
EPCI / mid-size town — Visibility on pooled traffic, detection of citizen-data exfiltration attempts.
High-capacity passive DPI probe for hospitals, regions, critical operators and large groups: 10 Gbps SFP+ or RJ45, up to 70,000 IPs, 5 years of compressed storage. Multi-year forensic time machine.
Use cases
Critical operators (LPM) — Main probe at the SI core, 5-year time machine, recurring NATO / Armed Forces audits.
Enterprise: foreign substitution — Replacing a foreign DPI probe with a sovereign solution, integrating with the internal SOC.
Virtualized software DPI probe for VMware ESXi, Proxmox VE, KVM and Hyper-V. Ideal for pooled IT departments and hyper-converged datacenters where adding physical hardware is not an option.
Use cases
Pooled regional IT department — Deployed on the IT department's hypervisor, captures east-west traffic between member-entity VMs.
Internal sovereign cloud — Visibility on internal flows of your private cloud, with no extra hardware.
Multi-protocol enterprise VPN platform (WireGuard, OpenVPN, IKEv2) self-hosted on your infrastructure. DNS filtering, distributed exit nodes, admin dashboard, deploys on Ubuntu in 5 minutes.
Use cases
Multi-customer ESN — White-label VPN for your customers, exit nodes distributed at their sites, central supervision.
Ministry / critical operator — Classified VPN deployed in an air-gap zone, full control of nodes, no external dependency.
Endpoint Detection & Response · Windows / macOS / Linux
Sovereign EDR agent for endpoints and servers: Windows, Windows Server, macOS, Linux. Batch management, zero trust, automatic quarantine, anti-shadow-IT DLP. Deployable on-premise with no outbound telemetry.
Use cases
SMB NIS2 compliance — EDR on every endpoint and server, court-admissible event log, SIEM integration.
Enterprise: replacing a foreign EDR — Substituting a US EDR with a sovereign solution that integrates into the existing SOC.
Asset mapping, automated audits, AI-driven pentest and Windows event collection.
Product
Description
Use cases
SYLink Activity
Windows Event ID collection · MSP-friendly
Lightweight agent that streams Windows Event IDs, user identifiers and system activity from endpoints to the MSP portal. Light, silent, GDPR-compliant.
MSP supervising 50 SMBs — Unified view of authentications and critical events across all customers from one console.
Early anti-ransomware detection — Alerting on typical ransomware patterns before encryption (suspicious process creation, etc.).
NIS2 / ISO 27001 compliance — Court-admissible event log, exportable for audit.
On-premise CAASM (Cyber Asset Attack Surface Management) solution that aggregates, in read-only mode, data from your existing tools (EDR, scanners, CMDB, DHCP, hypervisors, SIEM, MDM) to deliver a unified view of your IT, IoT and OT assets.
Hospital: HDS compliance and medical-IoT inventory — Discovery of connected medical devices, CVE tracking, remediation plan.
Enterprise: foreign-CAASM substitution — Replacing a US CAASM with a sovereign alternative integrable with the existing SI.
Industry: IT / OT convergence — Inventory of PLCs, HMIs, SCADA alongside servers and IT endpoints.
AI-driven automated penetration-testing platform, executed on your own infrastructure (on-premise). A swarm of autonomous agents orchestrates reconnaissance, exploitation and proof-of-concept validation across your external and internal perimeters (AD, network, IoT, OT).
Critical operators: continuous LPM pentesting — Permanent monitoring of the exposed perimeter, compliance with recurring NATO / Armed Forces audits.
ESN: Gigalis Lot 2 service — External pentests for public bodies, PASSI deliverables, white-label reports.
Enterprise: internal pentest before annual audit — Preparation for PASSI / ISO audits, early identification of gaps.
Lightweight agent that streams Windows Event IDs, user identifiers and system activity from endpoints to the MSP portal. Light, silent, GDPR-compliant.
Use cases
MSP supervising 50 SMBs — Unified view of authentications and critical events across all customers from one console.
Early anti-ransomware detection — Alerting on typical ransomware patterns before encryption (suspicious process creation, etc.).
On-premise CAASM (Cyber Asset Attack Surface Management) solution that aggregates, in read-only mode, data from your existing tools (EDR, scanners, CMDB, DHCP, hypervisors, SIEM, MDM) to deliver a unified view of your IT, IoT and OT assets.
Use cases
Hospital: HDS compliance and medical-IoT inventory — Discovery of connected medical devices, CVE tracking, remediation plan.
Enterprise: foreign-CAASM substitution — Replacing a US CAASM with a sovereign alternative integrable with the existing SI.
AI-driven automated penetration-testing platform, executed on your own infrastructure (on-premise). A swarm of autonomous agents orchestrates reconnaissance, exploitation and proof-of-concept validation across your external and internal perimeters (AD, network, IoT, OT).
Use cases
Critical operators: continuous LPM pentesting — Permanent monitoring of the exposed perimeter, compliance with recurring NATO / Armed Forces audits.
ESN: Gigalis Lot 2 service — External pentests for public bodies, PASSI deliverables, white-label reports.
Data-leak and exposure monitoring across the darkweb, surface web and criminal marketplaces. Three tiers based on your maturity: Basic (12 modules), Enterprise (28), VIP (58).
SMB: credential leaks after a vendor breach — Detect customer credentials exposed by a vendor compromise.
12 years · 30 PB/month · 12M+ IOCs · sovereign API
SYLink sovereign Cyber Threat Intelligence — 12 years of expertise operated from Clermont-Ferrand. 30 PB of network traffic analyzed every month across 1,200+ customer perimeters, 3 million attacks stopped each month. Live base of 12M+ IOCs, 334k+ CVEs monitored, 80+ MITRE ATT&CK techniques and 100k+ YARA / Sigma rules exposed via secure API (REST, Webhook, STIX/TAXII, MISP).
Augmented SIEM triage — Your SIEM raises 50,000 alerts/day. SYLink CTI enriches them with attacker context — your analysts focus on the 50 real threats.
Early detection of targeted campaigns — A ransomware family appears on a leak site. Its IOCs are pushed in under 30 minutes to all your probes — defenses block it before impact.
Threat-driven patching — A 9.8 CVE drops. The CTI cross-references your Vizu inventory and surfaces the assets that are actually exploitable — targeted patching, no panic.
Enterprise honeypot · MTTD < 30 s · lateral-movement detection
The silent tripwire that fires when the attacker thinks they're invisible. SYLink Hornetbot is a self-hosted enterprise decoy deployed within minutes inside your LAN or server VLAN: it impersonates a legitimate Windows server (SMB shares, RDP, SSH, fake business apps) and alerts on the first scan, the first authentication attempt, the first write to a trapped share. No user has any legitimate reason to touch it — every interaction is a qualified attack signal.
Multi-site town — detection of an annex compromise — A town of around 80,000 inhabitants deploys 3 Hornetbots (city hall, library, technical services). A library endpoint is compromised by an office-suite malware: 18 minutes after infection the local Hornetbot captures an SMB enumeration attempt from that endpoint — the attack is contained before reaching the central SI.
Law firm — RDP brute-force detected during business hours — A 120-person firm deploys a Hornetbot with a "backup server" persona (RDP only exposed internally). Mid-day, RDP attempts arrive from a user endpoint — the user has no reason to touch it. Compromised AD account isolated within the hour.
Clinic / hospital network — detection on the biomedical VLAN — Hornetbot with a "secondary PACS" persona deployed on the medical-imaging VLAN. Any interaction is abnormal by construction — qualified alert immediately on lateral propagation from the office VLAN.
Your employees use AI. The SOC knows before the leak.
Enterprise browser extension for Firefox, Chrome and Edge. SYLink Browser detects, locally, leaks of credentials, secrets and sensitive data toward public generative-AI services, phishing, typosquatting and risky usage — without ever reading your content in clear. Only a SHA-256 hash and a binary "secret detected" flag reach the SOC. GDPR-compatible by design, DPIA and works-council notice delivered ready to sign.
Law firm 80 staff — Shadow AI leak — Deployed after a documented leak at a peer firm (excerpts of pleadings pasted into a public AI assistant). Month 1: 12 Shadow AI alerts including 3 with secrets (case numbers, IBANs). Month 6: under 1 alert / month. Behavior durably changed by the "Cancel / Send anyway" modal.
Mid-market finance dept 350 people — suspicious OAuth grant — Detection of an abusive OAuth consent: an employee allowed a third-party plugin to read their work drive (accounting data). Without Browser, the data would have stayed accessible to the plugin's vendor for months. With Browser, alert the same day, revocation, training.
Local government — honeytoken + Browser — A fake "partner IBAN" placed on an SMB share. An employee copied its content into an AI assistant to "check the format". Browser surfaced the hash → match with the honeytoken → identified the at-risk behavior. Action: training, not punishment.
Data-leak and exposure monitoring across the darkweb, surface web and criminal marketplaces. Three tiers based on your maturity: Basic (12 modules), Enterprise (28), VIP (58).
Use cases
SMB: credential leaks after a vendor breach — Detect customer credentials exposed by a vendor compromise.
12 years · 30 PB/month · 12M+ IOCs · sovereign API
SYLink sovereign Cyber Threat Intelligence — 12 years of expertise operated from Clermont-Ferrand. 30 PB of network traffic analyzed every month across 1,200+ customer perimeters, 3 million attacks stopped each month. Live base of 12M+ IOCs, 334k+ CVEs monitored, 80+ MITRE ATT&CK techniques and 100k+ YARA / Sigma rules exposed via secure API (REST, Webhook, STIX/TAXII, MISP).
Use cases
Augmented SIEM triage — Your SIEM raises 50,000 alerts/day. SYLink CTI enriches them with attacker context — your analysts focus on the 50 real threats.
Early detection of targeted campaigns — A ransomware family appears on a leak site. Its IOCs are pushed in under 30 minutes to all your probes — defenses block it before impact.
Enterprise honeypot · MTTD < 30 s · lateral-movement detection
The silent tripwire that fires when the attacker thinks they're invisible. SYLink Hornetbot is a self-hosted enterprise decoy deployed within minutes inside your LAN or server VLAN: it impersonates a legitimate Windows server (SMB shares, RDP, SSH, fake business apps) and alerts on the first scan, the first authentication attempt, the first write to a trapped share. No user has any legitimate reason to touch it — every interaction is a qualified attack signal.
Use cases
Multi-site town — detection of an annex compromise — A town of around 80,000 inhabitants deploys 3 Hornetbots (city hall, library, technical services). A library endpoint is compromised by an office-suite malware: 18 minutes after infection the local Hornetbot captures an SMB enumeration attempt from that endpoint — the attack is contained before reaching the central SI.
Law firm — RDP brute-force detected during business hours — A 120-person firm deploys a Hornetbot with a "backup server" persona (RDP only exposed internally). Mid-day, RDP attempts arrive from a user endpoint — the user has no reason to touch it. Compromised AD account isolated within the hour.
Your employees use AI. The SOC knows before the leak.
Enterprise browser extension for Firefox, Chrome and Edge. SYLink Browser detects, locally, leaks of credentials, secrets and sensitive data toward public generative-AI services, phishing, typosquatting and risky usage — without ever reading your content in clear. Only a SHA-256 hash and a binary "secret detected" flag reach the SOC. GDPR-compatible by design, DPIA and works-council notice delivered ready to sign.
Use cases
Law firm 80 staff — Shadow AI leak — Deployed after a documented leak at a peer firm (excerpts of pleadings pasted into a public AI assistant). Month 1: 12 Shadow AI alerts including 3 with secrets (case numbers, IBANs). Month 6: under 1 alert / month. Behavior durably changed by the "Cancel / Send anyway" modal.
Mid-market finance dept 350 people — suspicious OAuth grant — Detection of an abusive OAuth consent: an employee allowed a third-party plugin to read their work drive (accounting data). Without Browser, the data would have stayed accessible to the plugin's vendor for months. With Browser, alert the same day, revocation, training.
Hardened workstations, biometric keys, roaming VPN, mobile supervision app.
Product
Description
Use cases
SYLink SafeKey
Biometric USB · IP geoloc · remote wipe
Mobile digital safe: hardware-encrypted USB drive with biometric reader, IP-based geolocation via the connected host, and remote lock / wipe via the SYLink portal.
Diplomacy: foreign travel — Carrying sensitive data, immediate lock if lost or seized at customs.
Audit firm: client report delivery — Physical delivery of confidential reports, full delivery traceability.
Defense industry: classified transfer — Exchanges between classified sites, compliance with secure-transport requirements.
Hardened anonymized mobile workstation · SaaS portal
Hardened mobile workstation for business travel and roaming remote work: isolated OS, traffic anonymization, carrier compliance. Connected to the SYLink SaaS portal for supervision (not compatible with strict-sovereign government use cases requiring pure on-premise).
Diplomatic delegations (non-classified) — Traffic anonymization, remote supervision, fast reset.
Turnkey VPN service for small organizations that want to give staff encrypted remote access without running a server. 10-minute setup, user profiles managed from the portal.
SMB remote work — Staff access the company's SaaS via an encrypted tunnel.
Liberal practice on the move — Secure connection from hotels, train stations, cafés.
Small multi-customer ESN — One VPN per customer, to compartmentalize access to customer environments.
iOS and Android mobile app, companion to the SYLink Box, Mini and Pro appliances. Real-time alerts, supervision and VPN management, 360° view of your cyber from your smartphone.
SMB owner — Quick view from the phone, alerts on incidents, hotline in one tap.
SMB CISO — Notifications on critical incidents even on the move, fast access to reports.
MSP managing several customers — Multi-account, aggregated view of critical alerts across the entire customer fleet.
Mobile digital safe: hardware-encrypted USB drive with biometric reader, IP-based geolocation via the connected host, and remote lock / wipe via the SYLink portal.
Use cases
Diplomacy: foreign travel — Carrying sensitive data, immediate lock if lost or seized at customs.
Audit firm: client report delivery — Physical delivery of confidential reports, full delivery traceability.
Hardened anonymized mobile workstation · SaaS portal
Hardened mobile workstation for business travel and roaming remote work: isolated OS, traffic anonymization, carrier compliance. Connected to the SYLink SaaS portal for supervision (not compatible with strict-sovereign government use cases requiring pure on-premise).
Use cases
Diplomatic delegations (non-classified) — Traffic anonymization, remote supervision, fast reset.
Turnkey VPN service for small organizations that want to give staff encrypted remote access without running a server. 10-minute setup, user profiles managed from the portal.
Use cases
SMB remote work — Staff access the company's SaaS via an encrypted tunnel.
Liberal practice on the move — Secure connection from hotels, train stations, cafés.
iOS and Android mobile app, companion to the SYLink Box, Mini and Pro appliances. Real-time alerts, supervision and VPN management, 360° view of your cyber from your smartphone.
Use cases
SMB owner — Quick view from the phone, alerts on incidents, hotline in one tap.
SMB CISO — Notifications on critical incidents even on the move, fast access to reports.
Encrypted file sharing and sovereign e-signature, aligned with eIDAS and GDPR.
Product
Description
Use cases
SYLink Transfer
Encrypted file sharing · 100% sovereign
Replaces WeTransfer, SwissTransfer and Dropbox Transfer with an end-to-end encrypted channel hosted in France. No extra-European actor can access the content — not even SYLink. Built for lawyers, accountants, consulting firms and MSPs that exchange sensitive documents.
Law firm — Exchange of sensitive documents with clients and peers, mandatory NDA, court-admissible audit if disputed.
Accountant — Tax statements and returns shared with executives, 7-day expiration, password sent via separate channel.
Consulting firm — Strategic deliverables with single-view for the ExecCom, self-destruct after read.
100% French electronic-signature platform, aligned on the eIDAS regulation. Simple, advanced and qualified signatures. Court-admissible archiving, sovereign hosting, GDPR-compliant. Replaces DocuSign, Adobe Sign and Yousign with no extra-European dependency.
Replaces WeTransfer, SwissTransfer and Dropbox Transfer with an end-to-end encrypted channel hosted in France. No extra-European actor can access the content — not even SYLink. Built for lawyers, accountants, consulting firms and MSPs that exchange sensitive documents.
Use cases
Law firm — Exchange of sensitive documents with clients and peers, mandatory NDA, court-admissible audit if disputed.
Accountant — Tax statements and returns shared with executives, 7-day expiration, password sent via separate channel.
100% French electronic-signature platform, aligned on the eIDAS regulation. Simple, advanced and qualified signatures. Court-admissible archiving, sovereign hosting, GDPR-compliant. Replaces DocuSign, Adobe Sign and Yousign with no extra-European dependency.
24/7 Network Operations Center · multi-site · MTTR < 30 min
Our Network Operations Center continuously supervises your customers' network quality of service: availability, latency, jitter, packet loss, WAN saturation, flow anomalies. 24/7/365 on-call by analysts based in Clermont-Ferrand. Dedicated dashboard, contractual SLAs, average MTTR < 30 minutes. Multi-site, multi-tenant deployment for MSPs.
MSP supervising 80 retail stores — Pooled NOC for the entire fleet, real-time visibility on every store, fast intervention on outage.
Multi-site hospital — Critical care continuity, alerting on link saturation between sites, SLAs aligned with the medical-business plan.
Industry 4.0 multi-plant — OT/IT supervision, anomaly detection on production-machine flows, MTTR aligned with operational windows.
Sovereign AI SOC · UniSOC · DPI + EDR + SYLink AI · 24/7
Our sovereign Security Operations Center, operated under the UniSOC brand from Clermont-Ferrand. Combines DPI probe, EDR agent and SYLink AI on-premise LLM (Ollama, Blackwell GPU). 24/7 multi-source detection, MTTD < 5 minutes for the covered MITRE techniques, HDS V2 hosting at Unitel Marseille — zero outbound queries. NIS2-, GDPR-, PSSIE-compliant.
Hospital — care continuity — Detection and response on critical perimeters, HDS-compliant logging, blocking that respects medical priorities.
Critical operators — LPM compliance — On-premise SOC with cleared MCO/MCS, NATO / Armed Forces audits, integration with CERT-FR.
Multi-site mid-market with internal SOC — UniSOC L3 backup of the internal SOC, escalation on complex incidents, sovereign threat intel.
24/7 Network Operations Center · multi-site · MTTR < 30 min
Our Network Operations Center continuously supervises your customers' network quality of service: availability, latency, jitter, packet loss, WAN saturation, flow anomalies. 24/7/365 on-call by analysts based in Clermont-Ferrand. Dedicated dashboard, contractual SLAs, average MTTR < 30 minutes. Multi-site, multi-tenant deployment for MSPs.
Use cases
MSP supervising 80 retail stores — Pooled NOC for the entire fleet, real-time visibility on every store, fast intervention on outage.
Multi-site hospital — Critical care continuity, alerting on link saturation between sites, SLAs aligned with the medical-business plan.
Sovereign AI SOC · UniSOC · DPI + EDR + SYLink AI · 24/7
Our sovereign Security Operations Center, operated under the UniSOC brand from Clermont-Ferrand. Combines DPI probe, EDR agent and SYLink AI on-premise LLM (Ollama, Blackwell GPU). 24/7 multi-source detection, MTTD < 5 minutes for the covered MITRE techniques, HDS V2 hosting at Unitel Marseille — zero outbound queries. NIS2-, GDPR-, PSSIE-compliant.
Use cases
Hospital — care continuity — Detection and response on critical perimeters, HDS-compliant logging, blocking that respects medical priorities.
Critical operators — LPM compliance — On-premise SOC with cleared MCO/MCS, NATO / Armed Forces audits, integration with CERT-FR.
Cybersecurity awareness and training — 4 certifying levels.
Product
Description
Use cases
SYLink Learn
Certifying cyber training · 4 levels · groups of 15
Online and on-site cybersecurity awareness solution. Four certifying modules, from rank-and-file employees to network administrators, delivered in groups of up to 15 people. Security is a collective effort — every employee becomes an active link in your defense.
SMB — mandatory annual N1 cycle — 1 hour per employee per year, phishing simulation, personalized completion certificate.
Mid-market — progressive plan N1 → N3 — Awareness for everyone, then specialized N2/N3 for the IT team. Cost amortized over 18 months.
Public sector — full regulatory cycle — Full N1 → N4 cycle for management and IT staff, court-admissible report.
Certifying cyber training · 4 levels · groups of 15
Online and on-site cybersecurity awareness solution. Four certifying modules, from rank-and-file employees to network administrators, delivered in groups of up to 15 people. Security is a collective effort — every employee becomes an active link in your defense.
Use cases
SMB — mandatory annual N1 cycle — 1 hour per employee per year, phishing simulation, personalized completion certificate.
Mid-market — progressive plan N1 → N3 — Awareness for everyone, then specialized N2/N3 for the IT team. Cost amortized over 18 months.