NeroLynx logoNeroLynxThe Detection Forge
How It WorksResearchServicesPricingFAQ
Open workspace Book a demo↗
Privacy Policy

Privacy Policy

How NeroLynx handles website, account, billing, and workflow-related information for the hosted platform.

Product context

NeroLynx handles account data, billing records, demo requests, and customer-submitted research or workflow material required to operate the hosted service.

Operating entity

The privacy posture is backed by NeroTeam Security Labs SAS, company number 949119036.

Last updatedApril 15, 2026
ContactTrustLegal NoticesPrivacy PolicyService Agreement

Scope

This Privacy Policy explains how NeroLynx and NeroTeam Security Labs collect, use, and protect information associated with the public website, demo requests, and the hosted product.

Because NeroLynx is built for detection engineering workflows, submitted material may include URLs, pasted threat research, synthetic telemetry prompts, detection content, query-validation inputs, and other workflow context that customers choose to provide while using the service.

What we collect

  • Contact information such as name, work email, and company when you request a demo or contact us
  • Account, organization, billing, and subscription metadata required to operate the hosted platform
  • Workflow inputs such as submitted URLs, research text, telemetry samples, synthetic log requests, detections, or validation content provided by the customer
  • Basic website, device, session, and usage information necessary to secure and operate the site and product

Why we process your data

  • Deliver the NeroLynx hosted service and product workflows
  • Authenticate users, manage organizations, and enforce service quotas, subscriptions, or billing controls
  • Provide support, respond to requests, and improve product quality, reliability, and operational safety
  • Maintain platform security, investigate abuse or misuse, and meet legal, contractual, or accounting obligations

Security and retention

We retain information only as long as needed for service delivery, support, fraud prevention, security review, legal compliance, or legitimate business administration.

NeroLynx applies technical and organizational controls appropriate for a cybersecurity product, but customers remain responsible for evaluating which information they choose to submit into hosted workflows.

If you are evaluating the hosted product, you should avoid pasting material that you are not authorized to process or that exceeds your internal approval boundaries for external tools.

Related pages

Operational security posture is summarized in the Trust Center, while contractual use of the hosted service is covered in the Service Agreement.

Privacy contact

For privacy questions or data subject requests, contact NeroTeam Security Labs through [email protected] and include enough information for us to identify the relevant account, request, or organizational context.

View Trust CenterRead Service Agreement

Ready to move earlier on new threats without lowering review standards?

Start with a trial or request a walkthrough to see how the platform helps your team build earlier coverage with clearer governance and cleaner analyst review.

Start free trial now Request demo↗
NeroLynx logo
NeroLynx
The Detection Forge
Read a threat report. Get a detection. NeroLynx turns raw intelligence into Sigma rules and SIEM queries your team can actually use.
NeroLynx was meticulously designed and engineered by NeroTeam Security Labs
  • NeroSpace
  • NeroTeam Labs
  • NeroSwarm Honeypot
  • NerOwl Shop
  • LinkedIn
  • Twitter (X)
  • Resources
  • Sign Up
  • How It Works
  • Research
  • Services
  • Pricing
  • FAQ
  • Book a Demo
  • Terms
  • Contact us
  • Legal Notices
  • Privacy Policy
  • Service Agreement
  • Trust

© 2026 NeroTeam Security Labs . All rights reserved.

NeroLynx LogoKonami Code.