By collecting telemetry from traditional networks, virtual environments,
Fusing multiple intelligence sources, machine learning, signatures, and anomaly detection with a fast and powerful query engine allows us to interpret months or even years of data.
We perform continuous backward and forward monitoring to identify threat factors, scope incidents, and reduce dwell time.
Analysts are empowered to pivot and navigate complex relationships revealing previously unknown patterns.
For more information about breach analytics for your enterprise, talk with an Eastwind Networks expert.
Eastwind Networks is your system of record
Eastwind Networks offers the only breach analytics cloud that provides complete visibility of your key cyber terrain. We help analyze the flight data flowing across your corporate networks, virtual networks, cloud provider networks, cloud application networks, and your mobile workforce—with speed and precision. Always watching, our automated hunters enable you to identify malicious activity that evades all other security solutions.
Our breach analytics technology searches, automatically and on-demand, through months of information to accelerate incident response and forensics. Serving as the system of record, Eastwind Networks provides the critical context you need to make intelligent decisions quickly.
The Eastwind Portal displays areas of interest quickly and easily using the breadth and depth of metadata using our customizable dashboards. It not only provides security event information but cyber situational awareness and context of your cyber key terrain. Eastwind provides the necessary context for security teams to respond and recover with bolstered threat intelligence and multiple detection techniques built upon complete visibility of your hybrid network. With the Eastwind Portal you can pivot rapidly, find complex relationships, and visualize patterns using the Breach Analytics Cloud
Get complete visibility across your entire attack surface by
collecting telemetry from the following environments
Cloud Providers (SaaS and IaaS) Via
Eastwind Cloud Sensors. Our virtual sensors are deployed directly into your cloud service provider’s infrastructure utilizing native capabilities to collect network telemetry from Amazon (available via AMI), Azure, Google and others.
Eastwind Cloud Connectors. Our connectors gather data from APIs and logs from cloud application providers such as GSuite (Google Apps for Work), Office365, Dropbox, Box, Salesforce and others to detect breaches and enable cloud forensics.
Users On and Off Premises Via
Eastwind Active Directory Connector. This connector collects user and system telemetry to detect breaches and provide critical context.
Eastwind DNS Services. Our enterprise DNS services provide malicious activity mitigation, granular content filtering and visibility for mobile users, no matter where they are. DNS telemetry provides valuable insight for network forensics and incident response.
Eastwind Compromised Credentials. Our Compromised Credentials service alerts you to data breaches that contain email addresses matching your organizational domain names reducing your window of exposure to attack or insider threats.
Corporate and Virtual Network Traffic Via
Eastwind Network Sensors. Our network sensors collect telemetry utilizing our high-speed deep application inspection and breach platform using both hardware and software appliances to provide visibility for traditional and virtual networks.
Our network sensors extracts 2,700 protocol plugins and 4,500 application metadata providing analysts deep context of network and user behavior. Analysts have the power to quickly develop their own dashboards in a matter of minutes.