1bn+
users worldwide

400k+
business customers

195
countries & territories

13
global R&D centers

GREYCORTEX - Network Traffic Analysis

Network traffic analysis tool exploiting artificial intelligence, machine learning and big data to ensure secure IT operations for enterprise, government and critical infrastructure users. Provides:

Round-the-clock security monitoring

Powerful rapid detection & response capabilities

Deep visibility into the internal network

Easy to use functionality


Higher capability than other protocols

MENDEL collects much more information on network traffic than NetFlow, IPFIX or similar protocols. The web user interface presents comprehensive data on network traffic. Data includes management overviews, communication of the network, subnetworks, users and applications, peers, individual flows and their content - in order to investigate interesting events.

Identifies threats before damage occurs

MENDEL investigates beyond known threats to detect symptoms of malicious behavior at the atomic level. Threats are identified in their early stages. This decreases incident response time, prevents further damage and reduces overall risk to the organization.

Identifies threats in IoT Devices

MENDEL monitors network flow data, also in IoT devices, to identify traffic in and out of the network and communication flows between devices within the network. This includes additional anomalous devices, excessive communication from one device to another or to a host outside the network, and periodic communication that is common in advanced persistent threats.

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

protected by ESET since 2016
more than 32,000 endpoints

ISP security partner since 2008
2 million customer base

The ESET difference

Flow-based and packet-based technology

Instead of relying on older and limited SNMP polling, MENDEL leverages flow-based and content-based monitoring. Flow-based monitoring provides near real-time (1 minute intervals) visibility into network statistics and other summary and detailed issues. Deep content inspection (DCI) extends this information with real-time comprehensive contextual metadata (user identity, applications, for example).

Application monitoring and more

MENDEL Analyst constantly monitors communication of users and network applications of all ports and on TCP, UDP, ICMP and many other protocols. This enables monitoring of current and average bandwidth, response times, transit times, delay, jitter, ports in use, connection peers and more.

Powerful forensics

MENDEL Analyst generates metadata of network communication providing full contextual awareness – for example destination and source, user's identity and application protocol. Unlike technologies based on full packet capture, it allows the metadata on network traffic to be stored for a much longer time with low demands on storage capacity.

Detection methods

These include signature-based detection, deep packet inspection, network behavior analysis, specialized algorithms, network performance monitoring and application performance monitoring.

ESET GREYCORTEX MENDEL

Make an enquiry

Leave us your contact details to receive an offer tailored for your company´s needs. No commitment.

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

The Wizard of OT: Leveraging MDR to help secure manufacturing

Threat actors looking to make a quick buck have long been targeting the manufacturing industry, as their use of often-outdated systems present easy targets.

Lumma Stealer: A fast-growing infostealer threat

In their biannual ESET Threat Report, ESET researchers have revealed a massive rise in detections of Lumma Stealer, which quietly threatens consumers and businesses alike.

See more

Fake job offers target software developers with infostealers

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims' crypto wallets and steals their login details from web browsers and password managers

DeceptiveDevelopment targets freelance developers

ESET researchers analyzed a campaign delivering malware bundled with job interview challenges