Continuously monitor your network to stop cyber attacks BEFORE they cripple you by.

Try it free of charge
Custocy Software interface
Anticipate _
Anticipate Detect Analyse React
It can be done.

CUSTOCY is an NDR (Network Detection & Response) solution based on an innovative artificial intelligence approach to identify the most complex and unknown (zero-day) cyber intrusions in your network.

It alerts your security team to malicious behaviour enabling them to respond to cyber attacks as quickly as possible.

The Custocy cyber platform combines artificial intelligence, behavioural analysis and threat intelligence ensuring 88 times less false positives.

Detection of Zero-Day attacks

Our anomaly detection technique using AI and our multiple sources of Threat Intelligence allow us to detect anomalous behaviour and zero-day threats.

Advanced Persistent Threat Detection

Using a multi-temporal view, our Artificial Intelligence detects and correlates unknown and sophisticated threats that persist over time.

Concise Threat overview

The CUSTOCY interface automatically correlates events to display threats with a threat score. Analysts are no longer subjected to an avalanche of alerts. Security management is made easier.

Simplified integration

Our NDR solution can be used through its intuitive interface or integrated with the existing ecosystem (SIEM, XDR, EDR, etc.). It adapts to your architecture regardless of its size and composition. Deployment is fast.

Custocy's software technology : metalearner

Unparalleled detection of attacks thanks to our core technology: the METALEARNER

The Metalearner is a novel technology developed by the Custocy team. It enables optimal detection of threats thanks to a multi-temporal vision based on artificial intelligence.

How does it work?

It orchestrates several AIs that each work at different time scales to detect different types of threats. It then categorises these predictions in the Custocy interface with a threat score.

It could be you


is the average time from initial access to impact

source: IBM Security


of victims had an up-to-date EDR solution



use lateral movement



is the average cost of a data breach in France

source: IBM Security

Latest news