CIO Influence
CIO Influence News Cloud Security

Endace Integrates with Microsoft Sentinel for Deep Network Visibility

Endace Integrates with Microsoft Sentinel for Deep Network Visibility

EndaceProbe and Microsoft Sentinel combine AI-powered intelligent SIEM with always-on packet capture, and deep network visibility for accelerated incident response in hybrid cloud environments

Packet capture authority Endace today announced an integration between EndaceProbe and Microsoft Sentinel, a next-generation cloud security, information, and event management (SIEM) solution. The integration provides NetOps and SecOps teams with one-click access to definitive, full packet evidence from within Microsoft Sentinel to streamline investigations. Access to Endace’s Always-On packet capture enables accurate event reconstruction and helps security teams to investigate and respond to threats more quickly, with absolute confidence.

Also Read: CoreWeave Launches NVIDIA GB200 Grace Blackwell Systems at Scale

Benefits of the integration include:

  • Streamlined investigation workflows, alerts, and playbooks from Microsoft Sentinel, with one-click, drill-down access to definitive, full packet evidence captured by EndaceProbe.
  • Continuously capture weeks or months of full packet data, across Hybrid, On-Prem, and Multi-Cloud environments.
  • Single central console for searching and analyzing recorded packet data across global scale networks, integrated with Microsoft Sentinel.
  • Deep visibility that shows exactly what happened before, during, and after every event.
  • Zero-Day Threat (ZDT) risk validation using playback of recorded network traffic
  • Combining EndaceProbe’s centralized search with Microsoft Sentinel’s AI-powered SIEM enables faster, more efficient incident investigation and resolution.
  • Military-grade Security: EndaceProbe appliances are FIPS 140-3 compliant and are listed on the DoDIIN APL.

Also Read: How Network Tooling Impacts IT Professionals’ Job Performance and Satisfaction

“Deep visibility into network activity is essential when responding to serious cybersecurity events, service outages, or performance issues. One-click access to EndaceProbe’s recorded packet data directly from Microsoft Sentinel shows incident responders exactly what happened before, during, and after any serious event,” said Cary Wright, VP Product at Endace.

“Microsoft Sentinel’s built in machine learning reduces noise and uncovers sophisticated threats while EndaceProbes provide a complete, packet-level record of network history. Integrating these two solutions gives SecOps teams easy access to definitive evidence required to triage the most serious threats on the network.”

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

Related posts

ScyllaDB Appoints SaaS Strategy Executive Wayne Ariola as Chief Marketing Officer

Aqua Security Launches Trivy Partner Connect to Expand Open Source Security Scanning Ecosystem

GlobeNewswire

Paradigm4 Announces the General Availability of flexFS

PR Newswire