Network Traffic Analysis to secure your IT operations



  • Provides round-the-clock security monitoring
  • Gives you powerful rapid detection & response capabilities
  • Take advantage of the solution’s powerful detection capabilities
  • Let’s you gain a deep visibility into the internal network
  • Powerful and easy to use

GREYCORTEX and their MENDEL, a Network Traffic Analysis tool helps enterprise, government, and critical infrastructure users make their IT operations secure and reliable through advanced artificial intelligence, machine learning, and big data analysis.



Flow-based and Packet-based Technology

Instead of relying on older and limited SNMP polling, MENDEL leverages flow-based and content-based monitoring. Flow-based monitoring provides near real-time (1 minute intervals) visibility into network statistics and other summary and detailed issues. Deep content inspection (DCI) extends this information with real-time comprehensive contextual metadata (user identity, applications, for example).

Application Monitoring and More

MENDEL Analyst constantly monitors communication of users and network applications of all ports and on TCP, UDP, ICMP and many other protocols. This enables monitoring of current and average bandwidth, response times, transit times, delay, jitter, ports in use, connection peers and more.

Detection Methods

  • Signature based detection
  • Deep packet inspection
  • Network Behavior Analysis
  • Specialized algorithms
  • Network performance monitoring
  • Application performance monitoring

Powerful Forensics

MENDEL Analyst generates metadata of network communication providing full contextual awareness – for example destination and source, user's identity and application protocol. Unlike technologies based on full packet capture, it allows the metadata on network traffic to be stored for a much longer time with low demands on storage capacity. 

Product gallery

Related information

Read the GREYCORTEX MENDEL product overview for more information on:

  • More details on how the solution works
  • Detection methods
  • Traffic processing and analysis
  • Outputs and Inputs
  • Appliance