Policy scoping
Define DLP rules, per-group exceptions, criticality levels.
Endpoint Detection & Response · Windows / macOS / Linux
Sovereign EDR agent for endpoints and servers: Windows, Windows Server, macOS, Linux. Batch management, zero trust, automatic quarantine, anti-shadow-IT DLP. Deployable on-premise with no outbound telemetry.
Sovereign EDR agent for endpoints and servers: Windows, Windows Server, macOS, Linux. Batch management, zero trust, automatic quarantine, anti-shadow-IT DLP. Deployable on-premise with no outbound telemetry.
SYLink EDR — Endpoint Detection & Response · Windows / macOS / Linux.
SYLink EDR utilise des hooks au niveau noyau pour observer les processus, les accès fichiers, les connexions réseau et les manipulations de mémoire. Sur Linux, l'agent s'appuie sur eBPF — performant et sans patch noyau. Sur macOS, sur les Endpoint Security APIs. Sur Windows, sur les Kernel Callbacks et ETW.
Le moteur de décision peut tourner en local (politique précompilée) ou faire appel à un SYLink AI local pour le triage des comportements ambigus. La quarantaine est immédiate, la restauration en un clic depuis la console.
Agent installé sur chaque poste et serveur (Windows, Linux, macOS). Détection comportementale, isolement automatique, télémétrie chiffrée vers la console SYLink centrale. Compatible avec votre SIEM existant.
Deployed via GPO (Windows), MDM (macOS / mobile), Ansible/Salt (Linux), or your RMM. Centrally configured from the console.
Define DLP rules, per-group exceptions, criticality levels.
Deploy on a sample, calibrate rules in monitor-only for 14 days.
Activate quarantine and DLP in production.
Deploy across the fleet via GPO/MDM/Ansible.
Logs to SIEM or UniSOC, shared response runbooks.
Define DLP rules, per-group exceptions, criticality levels.
Deploy on a sample, calibrate rules in monitor-only for 14 days.
Activate quarantine and DLP in production.
Deploy across the fleet via GPO/MDM/Ansible.
Logs to SIEM or UniSOC, shared response runbooks.
↓ Integration pipeline — step by step, from scoping to production ↓
Windows, Windows Server, macOS, Linux — same policy, same console, same experience.
Every action on the endpoint is evaluated in real time: process, file access, network communication.
Blocks uploads to personal Drives, WeTransfer, unencrypted USB sticks. The CISO sets the rules.
Console deployed on your premises (government-compatible). No data leaves your perimeter.
| Windows | 10 / 11 (32 et 64 bits) |
| Windows Server | 2016, 2019, 2022, 2025 |
| macOS | 12 Monterey → 15 Sequoia |
| Linux | Debian/Ubuntu, RHEL/Rocky/Alma, openSUSE |
| Détection | Comportementale + signatures |
| Quarantaine | Automatique sur menace confirmée |
| DLP | Inclus (clé USB, cloud, mail) |
| Patch management | Inclus (Win/Linux/macOS) |
| Empreinte CPU | < 2 % en moyenne |
| RAM | < 200 Mo |
| Network | < 5 Mo/jour de télémétrie |
| Mode offline | Persiste les événements, sync à la reconnexion |
| Déploiement | On-premise OU SaaS souverain |
| Intégration | AD / Entra ID, SIEM, UniSOC |
| Multi-tenant | Oui (pour MSP) |
| Conformité | RGPD by design, audit trail complet |
EDR on every endpoint and server, court-admissible event log, SIEM integration.
Substituting a US EDR with a sovereign solution that integrates into the existing SOC.
On-premise deployment with no outbound telemetry, II 901 / IGI 1300-compliant.
Multi-tenant console, white-label deployment, central supervision of customer incidents.
30-minute guided demo, PoC on a pilot perimeter, support by our French teams based in Clermont-Ferrand, Marseille and Rennes.