At its core, Eastwind technology is powered by the Eastwind Breach Analytics Cloud. This is powerful breach detection solution enables analysts to hunt, analyze and visualize all activity relevant to an IT system threat or breach. The Breach Analytics Cloud further integrates a comprehensive array of deployment sensors and applications to gather telemetry from all areas of your cyber terrain, including traditional networks, virtual environments, cloud, and all users on and off premises. The result is the security context needed across your entire enterprise to accelerate incident response and forensics.
Eastwind Portal displays areas of interest quickly and easily using the breadth and depth of metadata using our customizable dashboards. It not only provides security event information but cyber situational awareness and context of your cyber key terrain. Eastwind provides the necessary context for security teams to respond and recover with bolstered threat intelligence and multiple detection techniques built upon complete visibility of your hybrid network. With the Eastwind Portal you can pivot rapidly, find complex relationships, and visualize patterns using the Breach Analytics Cloud
Eastwind Automated Threat Hunters: As threat intelligence is updated, our automated threat hunters continuously search backwards and forwards to identify threats based on new intelligence. Add your own custom intelligence or integrate commercial intelligence providers. Once a threat is identified, we perform on-demand machine learning to identify where the entity became an outlier and use that model to retrospectively analyze your entire dataset to discover unknown threats. Two threat hunters are included but additional hunting options can be purchased.
Eastwind Mobile Accessibility: Our mobile app provides a comprehensive view of the Eastwind Breach Analytics Cloud, anytime and anywhere. Whether you are in or out of the office, your attack profile is constantly at your fingertips. You receive the actionable threat alerts and multi-sourced data you need to act quickly.
Eastwind Threat Intelligence: Eastwind integrates a growing list of industry leading cyber threat intelligence sources into our rules engine and enrichment processes, eliminating the need for you to acquire and integrate these yourself. In addition, Eastwind can leveraging industry-specific or proprietary threat feeds that your organization currently uses.
Eastwind Corporate Intelligence: All activity is meaningless without understanding how it applies to your organization. To enable teams to prioritize and provide the necessary context, we are partnering with leading vulnerability, patch management, asset management and corporate threat intelligence providers to extend your existing investments and integrate them directly into the Eastwind Breach Analytics Cloud.