Fusing multiple intelligence sources, machine learning, signatures, and anomaly detection with a fast and powerful query engine allows us to interpret months or even years of data.
We perform continuous real-time and historical monitoring to identify threat actors, scope incidents, and reduce dwell time.
Analysts are empowered to pivot and navigate complex relationships revealing previously unknown patterns.
Eastwind is your system of record
We enable organizations to embrace emerging technologies allowing them to digitally transform with a security first approach.
Eastwind provides the necessary context for security teams to respond and recover with bolstered threat intelligence and multiple detection techniques built upon complete visibility of your hybrid network. With Eastwind you can pivot rapidly, find complex relationships, and visualize patterns using the Breach Analytics Cloud.
Get complete visibility across your entire attack surface by
collecting telemetry from the following environments
Eastwind IaaS. Our cloud sensors are deployed directly into your cloud service provider’s infrastructure utilizing native capabilities to collect network telemetry from AWS, Azure, Google Cloud, IBM Cloud and others.
Eastwind for SaaS. Our SaaS integrations gather API and log data from cloud application providers such as G Suite, Office365, Dropbox, Box, Salesforce and others to detect breaches and enable cloud forensics.
Eastwind for Networks. Hybrid-network sensors collect telemetry utilizing our high-speed deep application inspection and enrichment engines utilizing both hardware and software appliances to provide visibility for your on-premises and datacenter networks. Our network sensors extract metadata from over 3,000 network-based applications providing analysts deep context of network and user behavior.
Eastwind Active Directory Connector. Collects user and system telemetry to provide critical context.
Eastwind for DNS. Our enterprise DNS services provide malicious activity mitigation, granular content filtering and visibility for mobile users, no matter where they are. DNS telemetry provides valuable insight for network forensics and incident response.
Eastwind Compromised Credentials. Our Compromised Credentials service alerts you to data breaches that contain email addresses matching your organizational domain names reducing your window of exposure to attack or insider threats.