The Most Advanced Security Network Traffic Analysis
GreyCortex Mendel is a solution for advanced network security and performance monitoring for enterprise, government and other critical infrastructure.
It dramatically improves the capabilities of security and network operations departments for rapid detection and response to security and other incidents.
Its advanced machine learning, unique specialized algorithms and deep insight into network traffic make the detection of advanced threats and other behavioral anomalies more sensitive and reliable while decreasing the cost of operation.
Artificial Intelligence in Behavioral Detection
Unlike most solutions, Mendel Analyst is not dependent on manually set rules (thresholds). Instead, its advanced artificial intelligence (Machine Learning) and Data Mining automatically generate rules for anomaly detection relevant for a particular network or device. These rules describe behavior of the whole network, each subnetwork, hosts and services. The rules gradually and automatically adapt as traffic and threats in the network evolve to effectively pinpoint malicious and anomalous behavior.
Much More Capable than NetFlow
Mendel Analyst collects several times more information on network traffic than NetFlow, IPFIX or similar protocols. NetFlow or IPFIX records are enhanced with security parameters and performance analysis. These include frequency, spectral and traffic content features which are crucial for more sensitive behavioral detection.
Robust Detection Capabilities
Most specialized security technologies deal only with certain attack vectors, such as network threats to endpoints, and miss a range of other vectors such as infections outside of the network (especially important in case of BYOD policies) or threats targeting servers, databases etc. This has significant limitations that Mendel Analyst is designed to overcome.
Mendel Analyst focuses on the entire enterprise infrastructure and all network traffic. Apart from general anomaly detection capabilities, it uses specialized detection algorithms for detection of malicious behavior, distinguishing machine and human behavior and more traditional signature-based detection.
- Signature based detection
- Deep packet inspection
- Network Behavior Analysis
- Specialized algorithms
- Network performance monitoring
- Application performance monitoring
- SIEM & LDAP connectors
- Risk Assessment
- Advanced Reporter
- SPAN / mirrored port
- 0.5 – 10Gbps per line
- Complementary sources: NetFlow & IPFIX, security events from endpoints