GREYCORTEX - NETWORK TRAFFIC ANALYSIS

Network traffic analysis to secure your IT operations

1bn+
users worldwide

400k+
business customers

195
countries & territories

13
global R&D centers

GREYCORTEX - Network Traffic Analysis

Network traffic analysis tool exploiting artificial intelligence, machine learning and big data to ensure secure IT operations for enterprise, government and critical infrastructure users. Provides:

Round-the-clock security monitoring

Powerful rapid detection & response capabilities

Deep visibility into the internal network

Easy to use functionality


Higher capability than other protocols

MENDEL collects much more information on network traffic than NetFlow, IPFIX or similar protocols. The web user interface presents comprehensive data on network traffic. Data includes management overviews, communication of the network, subnetworks, users and applications, peers, individual flows and their content - in order to investigate interesting events.

Identifies threats before damage occurs

MENDEL investigates beyond known threats to detect symptoms of malicious behavior at the atomic level. Threats are identified in their early stages. This decreases incident response time, prevents further damage and reduces overall risk to the organization.

Identifies threats in IoT Devices

MENDEL monitors network flow data, also in IoT devices, to identify traffic in and out of the network and communication flows between devices within the network. This includes additional anomalous devices, excessive communication from one device to another or to a host outside the network, and periodic communication that is common in advanced persistent threats.

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 million customer base

The ESET difference

Flow-based and packet-based technology

Instead of relying on older and limited SNMP polling, MENDEL leverages flow-based and content-based monitoring. Flow-based monitoring provides near real-time (1 minute intervals) visibility into network statistics and other summary and detailed issues. Deep content inspection (DCI) extends this information with real-time comprehensive contextual metadata (user identity, applications, for example).

Application monitoring and more

MENDEL Analyst constantly monitors communication of users and network applications of all ports and on TCP, UDP, ICMP and many other protocols. This enables monitoring of current and average bandwidth, response times, transit times, delay, jitter, ports in use, connection peers and more.

Powerful forensics

MENDEL Analyst generates metadata of network communication providing full contextual awareness – for example destination and source, user's identity and application protocol. Unlike technologies based on full packet capture, it allows the metadata on network traffic to be stored for a much longer time with low demands on storage capacity.

Detection methods

These include signature-based detection, deep packet inspection, network behavior analysis, specialized algorithms, network performance monitoring and application performance monitoring.

ESET GREYCORTEX MENDEL

Make an enquiry

Leave us your contact details to receive an offer tailored for your company´s needs. No commitment.

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

ETeC 2024: How ESET participated in the Grandoreiro banking trojan disruption

ESET collaborated with the Federal Police of Brazil, providing technical analysis and information gathered from ESET telemetry and tracked command and control servers.

Games, apps, websites… anything can be abused. How to protect your family from mobile threats

ESET levels up its Mobile Security app to be even more effective against phishing.

See more

We Live Security blog

Jane Goodall: Reasons for hope | Starmus highlights

The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity

Month in security with Tony Anscombe – October 2024 edition

Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories