How to Use New Features in Real Life
If you missed our live session, you can now watch the full recording of our use cases webinar focused on Mendel 4.5 and 4.6.
In this session, we walk through practical scenarios that show how the latest enhancements support faster investigations and provide better network context across IT, OT, and cloud environments. The content is based on real security team workflows and daily operational challenges.
What you will see in the recording
- Tracing “invisible” attackers in complex networks
- Identifying device roles across IT and OT environments
- Incident investigation and proactive threat hunting
- Fast and reliable validation of suspicious activity
- Managing access using external identities
- Uncovering the true sources of attacks
- Ensuring continuous security monitoring, even during failures or outages
Why watch the recording
The session explains how recent Mendel enhancements integrate naturally into existing security workflows. You will see how to work with richer context, reduce investigation time, and improve visibility during monitoring, deep traffic analysis, and incident response.
Is this for you?
This recording is relevant for CISOs, SOC analysts, security engineers, and network administrators who want to get more operational value from Mendel in their daily work.
Categories
- Company News (35)
- Product News (27)
- IT/OT Security (39)
- Webinars (6)