Skip to content

Network Traffic Analysis Security for Professionals

MENDEL integrates advanced artificial intelligence, machine learning, and data analysis to find threats, identify vulnerabilities, and give your IT team full network visibility, all while saving time.

Current network security tools leave networks vulnerable because of a lack of detection for advanced threats, lack of visibility, and a lack of integration. This means threats hide in the network, infected devices and misconfigurations go unnoticed, and analysts must switch between different platforms to stop attacks when they are finally detected.

For more details, please visit official website:
greycortex.hk     greycortex.tw     greycortex.sg
網路流量分析為專業人員量身訂做的
安全方案

MENDEL integrates advanced artificial intelligence, machine learning, and data analysis to find threats, identify vulnerabilities, and give your IT team full network visibility, all while saving time.

Current network security tools leave networks vulnerable because of a lack of detection for advanced threats, lack of visibility, and a lack of integration. This means threats hide in the network, infected devices and misconfigurations go unnoticed, and analysts must switch between different platforms to stop attacks when they are finally detected.

For more details, please visit official website:
greycortex.hk     greycortex.tw     greycortex.sg

     Why Choose MENDEL

MENDEL, the network traffic analysis solution from GREYCORTEX combines advanced detection techniques with full network visibility and integrations with security infrastructure tools to detect threats, visualize communications, and respond quickly and effectively. This includes advanced and unknown threats which are able to bypass existing security tools. MENDEL helps secure your network, protecting data, reducing risk, and maintaining safety.

     Security Tools for Professionals

Comprehensively detect network vulnerabilities

Effectively prevent APTs, ransomware, zero-day attacks

AI monitors device behaviours cut off attacks when detected

Complete report to meet network audit requirements

Comprehensively detect network vulnerabilities

Effectively prevent APTs, ransomware, zero-day attacks

AI monitors device behaviours cut off attacks when detected

Complete report to meet network audit requirements

     Deployment

Sensors
  • Mirror from core switch/TAP
  • ASNM output (= 0,5% – 1% of traffic)
  • Up to 10Gbps/sensor
Collectors
  • 1 collector = 10+ sensors
  • Aggregated input up to 40Gbps+
  • Central collector for events
Appliances
  • Passive
  • On premise
  • HW or virtual deployment (VMware ESXi, Hyper-V, KVM…)

      Architecture

|

HEAR WHAT CUSTOMERS SAY ABOUT US

When our customers use our products, what difference does it bring to their business?

HEAR WHAT CUSTOMERS SAY ABOUT US

When our customers use our products, what difference does it bring to their business?

(852) 2893 8860

    E-mail:sales@version-2.com.hk
    Fax: (852) 2893 8214

(852) 2893 8860

    E-mail:sales@version-2.com.hk
    Fax: (852) 2893 8214

(852) 2893 8860

    E-mail:sales@version-2.com.hk
    Fax: (852) 2893 8214
×

Hello!

Click one of our representatives below to chat on WhatsApp or send us an email to wordpress@version-2.com.hk

×