
Innovation Mode ON

Get Control. Monitor. Automate Actions
Define and control your infrastructure, setup powerful controls, and increase your security level and compliance.

Integration with Your Platforms and Tools






Features and benefits
The Platform to Build a Detailed Cybersecurity Model
Lets be clear: there’s no such thing as an automatic nor AI generated security. Security is given by a solid and detailed control of all the assets and events in your infrastructure.

Define the Events of interest
Create a full mapping of all your events, positive and negative ones. The output will be your base model.

Create rules and actions related to Events
Handle Events by applying multiple rules connected to actions which tell the platform what to do and for which conditions.

Integrate your systems, applications, APIs
The platform speaks to the OS, to applications, to APIs, to your cloud systems.

Continuous Security
Setup your security and gain more quality in your 24/7 realtime security. Automatically builds your Security Intelligence.

Agent Based or Agentless mode
The platform can work with its cross OS Agent or without any agent or in hybrid mode. An agent gives a degree of inside control on your instances.

Scalable System
Deploy one or more Data Collection Nodes to receive and transport your infrastructural Events. Same for the Analysis Nodes. And manage them in Round Robin, Lowest Load or Random mode.
Featured Sections
We believe in building security — Having in mind regulatory compliance and international standards
The best security model you can have goes deep into all your infrastructural details (assets, organization values, data flows, priorities, procedures). And maps the results to regulatory laws and international standards (ISO/IEC, NIST, UAE ADISS, UAE IAR, DESC CSPSS, etc)

Building CyberSecurity
“Details make perfection, and perfection is not a detail”
Leonardo Da Vinci said that. Building a solid CyberSecurity Operational Model requires a lot of work on details: anything measurable in your infrastructure may contribute to creating the model. Events coming from logs, registries, applications, APIs (in both directions, from and to the platform), system statuses, measurements, aggregated functions. The correct way to manage security is be aware of as many details as possible about your infrastrucure.
Use Cases
Real World Use Cases
There are so many real world cases which impact cybersecurity. We don’t believe in the all-in-one solution when it comes to security. But we strongly believe that observation and monitoring are the basics for implementing procedures and mechanisms that can really protect our systems.
From attacks to human errors, to responding to significant events by disabling non-critical services and/or activating more resources, to having the capability to define and process events from multiple sources, to managing the infrastructure as a live complex entity… well we tried to manage a whole set of scenarios and organize them in a workflow framework.

Latest news and articles
Keep an eye on our latest releases and articles.
-
Read more: Beta platform online!
Our first Beta version of the platform is online! After around 1 year testing with a real world infrastructure and collecting 1.8 million events we think it’s time to step up to a new level. All the mechanisms we planned for Version 1 of the platform are working and data is flowing through the system….
Frequently Asked Questions
Got questions? We’ve got answers.
If you don’t find your answer here, please fell free to contact us to get more answers.
Yes, we arere preparing a demo version open to the public! We’ll be glad to annouce it as soon as we’re ready with that.
What does the Flying Gecko Platform do?
Flying Gecko is and event driven platform. It helps you define and manage event workflows which permit the execution of actions (notification, remediation, reconfiguration, etc). It’s made to give you a detailed control on your infrastructure(s) and to map your regulatory compliance / standard compliance.
Who can benefit from using the platform?
Small, medium and enterprise organizations may use the platform. It’s an IT security enforcing platform and may be applied to any kind of organization.
Who is the platform’s typical user?
It’s made for IT security professionals: architects, engineers, specialists, and more generally for whoever manages cybersecurity. Having functionalities for monitoring, detection and remediation it helps security operators manage detailed / granular / instance or service level security, and also keep an eye on security at a macro level.
Is the platform agent-based?
It can work with or without agents. The platform has its own Agent software which may be installed on instances / VM / bare metal, both Linux and Windows. But the platform may also work without installing any agent, by ingesting data via API calls, HTTP requests, emails, etc.

Try It Free. Scale When You’re Ready.
Get started without limits. Explore all features at your own pace — upgrade only when your business grows.
