GREYCORTEX - NETWORK TRAFFIC ANALYSIS

Network traffic analysis to secure your IT operations

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

GREYCORTEX - Network Traffic Analysis

Network traffic analysis tool exploiting artificial intelligence, machine learning and big data to ensure secure IT operations for enterprise, government and critical infrastructure users. Provides:

Checkmark icon

Round-the-clock security monitoring

Checkmark icon

Powerful rapid detection & response capabilities

Checkmark icon

Deep visibility into the internal network

Checkmark icon

Easy to use functionality


Higher capability than other protocols

MENDEL collects much more information on network traffic than NetFlow, IPFIX or similar protocols. The web user interface presents comprehensive data on network traffic. Data includes management overviews, communication of the network, subnetworks, users and applications, peers, individual flows and their content - in order to investigate interesting events.

Identifies threats before damage occurs

MENDEL investigates beyond known threats to detect symptoms of malicious behavior at the atomic level. Threats are identified in their early stages. This decreases incident response time, prevents further damage and reduces overall risk to the organization.

Identifies threats in IoT Devices

MENDEL monitors network flow data, also in IoT devices, to identify traffic in and out of the network and communication flows between devices within the network. This includes additional anomalous devices, excessive communication from one device to another or to a host outside the network, and periodic communication that is common in advanced persistent threats.

Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

Allianz Suisse logo

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-Com logo

ISP security partner since 2008
2 million customer base

The ESET difference

Flow-based and packet-based technology

Instead of relying on older and limited SNMP polling, MENDEL leverages flow-based and content-based monitoring. Flow-based monitoring provides near real-time (1 minute intervals) visibility into network statistics and other summary and detailed issues. Deep content inspection (DCI) extends this information with real-time comprehensive contextual metadata (user identity, applications, for example).

Application monitoring and more

MENDEL Analyst constantly monitors communication of users and network applications of all ports and on TCP, UDP, ICMP and many other protocols. This enables monitoring of current and average bandwidth, response times, transit times, delay, jitter, ports in use, connection peers and more.

Powerful forensics

MENDEL Analyst generates metadata of network communication providing full contextual awareness – for example destination and source, user's identity and application protocol. Unlike technologies based on full packet capture, it allows the metadata on network traffic to be stored for a much longer time with low demands on storage capacity.

Detection methods

These include signature-based detection, deep packet inspection, network behavior analysis, specialized algorithms, network performance monitoring and application performance monitoring.

ESET GREYCORTEX MENDEL

Make an enquiry

Leave us your contact details to receive an offer tailored for your company´s needs. No commitment.

Looking for the complete security of your network?

Related bundled solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

Multilayered technology, machine learning and human expertise combined with easy to use on-premise security management to provide best level protection.

  • On-premise management
  • Endpoint security
  • File server security
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

Business solution for superior and enhanced protection of an organization’s data and intellectual property. Includes:

  • Two-factor Authentication
  • Endpoint Encryption
ESET Dynamic Mail Protection solution icon

ESET Dynamic Mail Protection

  • Security Management Center
  • Mail Security
  • Cloud Sandbox Analysis
ESET Secure Business solution icon

ESET Secure Business

  • Security Management Center
  • Endpoint Security
  • File Server Security
  • Mail Security

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

Shining a light on Computer Security Day 2018

They say that a dog is for life and not just for Christmas, and in much the same way cybersecurity is something we should consider year-round.

ESET Internet Security wins MRG Effitas Online Banking Award

We are thrilled to announce that ESET Internet Security has been awarded this year's MRG Effitas Online Banking Award.

See more

We Live Security blog

Next Generation Dark Markets? Think Amazon or eBay for criminals

The “evolution” of these markets is making cybercrime easier than ever before

Week in security with Tony Anscombe

DanaBot operators have been expanding the malware’s scope with new spam-sending capability. ESET researchers discovered a set of previously undocumented Linux malware families based on OpenSSH. Plus...