Full Network Visibility
What's hiding in your network?
Many network security tools don’t let you answer “Yes” to this question. Either they rely on one statistically-focused protocol like NetFlow, they require advanced profiling of a specific section of the network, or they don’t permit real-time access to communications data. MENDEL offers security teams the information they need to easily find exactly what devices are in the network, and their communications, in real time. This also allows easy root-cause analysis, faster threat hunting, and effective network troubleshooting.
.Every host
.Every service
.Every subnet
.Up to Layer 7
.Including traffic decryption with a private key
.Identify communication relationships between every device
    on the monitored network

Unique among network security providers, GREYCORTEX designed MENDEL with a unique approach to storing collected network traffic data which offers full and consistent data filtering and visualization. MENDEL offers up to 20 filter parameters, including every individual subnet, host, device, and application on the network, so you can see exactly what devices are communicating with each other, at any given time. Filterable historical data can be stored nearly indefinitely due to our optimizations, depending on hardware. And, MENDEL's detection approach allows for unique behavioral analysis to detect unusual events between devices which is uncommon based on learned behavioral modeling.

MENDEL provides the ability to visualize every device on the network in real time so you know exactly what devices are in the network. But MENDEL takes this visualization a step further, with advanced filtering, every device can not only be seen, but also its communications with other devices on the network - including with whom, when, how much data, on what protocol, etc., which means that security and operational events finally have detailed context. This also means that root cause analysis, threat hunting, and network troubleshooting are a snap.

Rather than relying on a single data protocol like NetFlow alone, MENDEL analyzes hundreds of network traffic metadata attributes, as well as proper and continuous bi-directional flows, and provides detailed visibility for network layers L3 to L7. This means that MENDEL can be much more sensitive to network anomalies and provide analysts better detail regarding threats, misconfigurations, and other suspicious activities.
.Every host
.Every service
.Every subnet
.Up to Layer 7
.Including traffic decryption with
    a private key
.Identify communication
    relationships between every
    device on the monitored
    network

Unique among network security providers, GREYCORTEX designed MENDEL with a unique approach to storing collected network traffic data which offers full and consistent data filtering and visualization. MENDEL offers up to 20 filter parameters, including every individual subnet, host, device, and application on the network, so you can see exactly what devices are communicating with each other, at any given time. Filterable historical data can be stored nearly indefinitely due to our optimizations, depending on hardware. And, MENDEL's detection approach allows for unique behavioral analysis to detect unusual events between devices which is uncommon based on learned behavioral modeling.

MENDEL provides the ability to visualize every device on the network in real time so you know exactly what devices are in the network. But MENDEL takes this visualization a step further, with advanced filtering, every device can not only be seen, but also its communications with other devices on the network - including with whom, when, how much data, on what protocol, etc., which means that security and operational events finally have detailed context. This also means that root cause analysis, threat hunting, and network troubleshooting are a snap.

Rather than relying on a single data protocol like NetFlow alone, MENDEL analyzes hundreds of network traffic metadata attributes, as well as proper and continuous bi-directional flows, and provides detailed visibility for network layers L3 to L7. This means that MENDEL can be much more sensitive to network anomalies and provide analysts better detail regarding threats, misconfigurations, and other suspicious activities.
.Every host
.Every service
.Every subnet
.Up to Layer 7
.Including traffic decryption with
    a private key
.Identify communication
    relationships between every
    device on the monitored
    network

Unique among network security providers, GREYCORTEX designed MENDEL with a unique approach to storing collected network traffic data which offers full and consistent data filtering and visualization. MENDEL offers up to 20 filter parameters, including every individual subnet, host, device, and application on the network, so you can see exactly what devices are communicating with each other, at any given time. Filterable historical data can be stored nearly indefinitely due to our optimizations, depending on hardware. And, MENDEL's detection approach allows for unique behavioral analysis to detect unusual events between devices which is uncommon based on learned behavioral modeling.

MENDEL provides the ability to visualize every device on the network in real time so you know exactly what devices are in the network. But MENDEL takes this visualization a step further, with advanced filtering, every device can not only be seen, but also its communications with other devices on the network - including with whom, when, how much data, on what protocol, etc., which means that security and operational events finally have detailed context. This also means that root cause analysis, threat hunting, and network troubleshooting are a snap.

Rather than relying on a single data protocol like NetFlow alone, MENDEL analyzes hundreds of network traffic metadata attributes, as well as proper and continuous bi-directional flows, and provides detailed visibility for network layers L3 to L7. This means that MENDEL can be much more sensitive to network anomalies and provide analysts better detail regarding threats, misconfigurations, and other suspicious activities.

Do you have any question?
Please leave us your contact details so we can deliver a personalized offer tailored to your company’s needs.