CIO Influence
CIO Influence News Cloud Security

Endace Integrates with Microsoft Sentinel for Deep Network Visibility

Endace Integrates with Microsoft Sentinel for Deep Network Visibility

EndaceProbe and Microsoft Sentinel combine AI-powered intelligent SIEM with always-on packet capture, and deep network visibility for accelerated incident response in hybrid cloud environments

Packet capture authority Endace today announced an integration between EndaceProbe and Microsoft Sentinel, a next-generation cloud security, information, and event management (SIEM) solution. The integration provides NetOps and SecOps teams with one-click access to definitive, full packet evidence from within Microsoft Sentinel to streamline investigations. Access to Endace’s Always-On packet capture enables accurate event reconstruction and helps security teams to investigate and respond to threats more quickly, with absolute confidence.

Also Read: CoreWeave Launches NVIDIA GB200 Grace Blackwell Systems at Scale

Benefits of the integration include:

  • Streamlined investigation workflows, alerts, and playbooks from Microsoft Sentinel, with one-click, drill-down access to definitive, full packet evidence captured by EndaceProbe.
  • Continuously capture weeks or months of full packet data, across Hybrid, On-Prem, and Multi-Cloud environments.
  • Single central console for searching and analyzing recorded packet data across global scale networks, integrated with Microsoft Sentinel.
  • Deep visibility that shows exactly what happened before, during, and after every event.
  • Zero-Day Threat (ZDT) risk validation using playback of recorded network traffic
  • Combining EndaceProbe’s centralized search with Microsoft Sentinel’s AI-powered SIEM enables faster, more efficient incident investigation and resolution.
  • Military-grade Security: EndaceProbe appliances are FIPS 140-3 compliant and are listed on the DoDIIN APL.

Also Read: How Network Tooling Impacts IT Professionals’ Job Performance and Satisfaction

“Deep visibility into network activity is essential when responding to serious cybersecurity events, service outages, or performance issues. One-click access to EndaceProbe’s recorded packet data directly from Microsoft Sentinel shows incident responders exactly what happened before, during, and after any serious event,” said Cary Wright, VP Product at Endace.

“Microsoft Sentinel’s built in machine learning reduces noise and uncovers sophisticated threats while EndaceProbes provide a complete, packet-level record of network history. Integrating these two solutions gives SecOps teams easy access to definitive evidence required to triage the most serious threats on the network.”

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

Related posts

Supermicro Total IT System Portfolio Delivers Industry-Leading, Seamless, Edge-to-Cloud Solutions to Growing 5G and Intelligent-Edge Markets

CIO Influence News Desk

NEC Launches a New Model of the “SX-Aurora TSUBASA” Vector Supercomputer That More Than Doubles Computing Performance

Ericsson and KORE to Simplify Global IoT Deployments and Offer Unrivaled IoT Coverage in U.S.

Cision PRWeb