SentryWire partners with the leading security solution providers to extend the power of our Packet Capture Platform. This ecosystem of partner technologies includes governance, risk compliance management platforms, intrusion detection systems, behavior based solutions, hardware and OS providers, other security and industry solutions.


Featured Partners


 
 
 

Together with Keysight’s Network Visibility Platform, the SentryWire solutions give enterprises broad visibility into their traffic and control over how that traffic is handled on an extremely granular level. In the event of a security incident, forensic analysts can review and investigate the traffic history to pinpoint an attacker’s entry point, identify the malware used and uncover what data was exfiltrated.

 

 
 
 

Gigamon with their GigaSECURE Security Delivery Platform instrumented with SentryWire's Packet Capture Solution gives enterprises broad visibility into their traffic and control over how that traffic is handled on an extremely granular level. In the event of a security incident, forensic analysts can review and investigate the traffic history in order to pinpoint an attacker's entry point, identify the malware used and uncover what data was exfiltrated.

 

 
 
 

Trinity Cyber adds an active layer of threat response and prevention outside of your network edge that enables defenders to gain the upper hand against advanced threats. Organizations who subscribe to our Intrusion Prevention as a Service access real-time notification on what is being actively prevented from happening on their networks. Rich metadata on every threat we prevent, and on-call experts for technical questions and collaboration. With this information, organizations deploying SentryWire Packet Capture for internal networks can better focus their investigations to expedite resolution with confidence. With Trinity Cyber acting outside the network edge, and SentryWire illuminating traffic inside the network, network defenders can finally take a breath.

 

 
Virsec-Logo-1.png
 
 

Short of securely rewriting all of the binary underpinnings of an application from scratch, Virsec ARMAS is the only cyber security solution that imposes deterministic (non-signature-based) runtime control flow integrity on all layers of an application. This powerful new security enforcement approach enables it to detect and remediate both zero-day attacks and attacks against known vulnerabilities within milliseconds of an initial attack or attempted infiltration.

Such an early warning counter offensive system not only enables organizations to stop the cyberattacks proactively, but now in combination with SentryWire, produces a detailed, near-real time trace of the actual traffic involved in the attack. It gives organizations the ability to eliminate business disruption and collect evidentiary quality audit logs and forensics.

 

 
Extreme Networks CMYK 229 x 79 1.png
 
 

Using simple and scalable network segmentation combined with advanced packet capture and analytics, Extreme & SentryWire make managing everywhere-access practical, while significantly minimizing damage caused by breaches.

 

 
 
Threatstop-logo-1.png
 

Based on ThreatSTOP’s IP Defense cloud security service, the joint solution leverages a comprehensive threat intelligence engine containing real-time threats aggregated from nearly 60 unique threat intelligence feed sources. The engine utilizes both human security analysis and proprietary algorithms to curate, sanitize, and remove false positives. This comprehensive understanding of the fast-moving threat landscape allows for accurate and automated identification of threats present in network traffic entering or leaving the network perimeter.

Unlike other tools that only integrate into a SIEM, are highly prone to false positives, or notify you of threats hours, days, or even months after they occurred, the SentryWire and ThreatSTOP solution alerts on real-time packet traffic where the source or destination IP address is known to be currently malicious. These alerts can be indicative of external attacks in progress, or threats that have bypassed firewall, IDS/IPS, web filter and endpoint security, and are attempting outbound communication with criminal C2 infrastructure. Joining ThreatSTOP with SentryWire produces a detailed, near-real time trace of the actual traffic involved in the attack - giving organizations the ability to respond to threats faster, eliminate business disruption, collect evidentiaryquality audit logs and conduct detailed forensic investigations.

 

 
Magnet Forensics and SentryWire Joint Solution Brief
 
 

By combining the forces of Magnet AXIOM with SentryWire, incident responders now have a way to complete in-depth post-mortem and root cause analysis in a fraction of the time it might once have taken them. Incident responders can use SentryWire with AXIOM to identify attack vector artifacts such as delivery mechanisms and payloads, parsing emails, logs that reflect the use of removable media, and network services to paint a more complete picture of what happened. Because AXIOM analyzes a breadth of digital data from host systems, responders can conduct more thorough investigations by combining timelines from both affected hosts and PCAPs. A more complete timeline enables the search for events in close temporal proximity to attack vectors. The SentryWire-AXIOM integration leverages AXIOM’s foundation analyzing internetbased artifacts such as webmail, instant messaging, browser history, and more. It also brings AXIOM’s powerful reporting and collaboration capabilities to bear, enabling responders to communicate clearly and effectively with key stakeholders at any level.

 

Avalon and SentryWire Joint Solution Brief
 

By combining the forces of the King & Union’s Avalon platform with the SentryWire full network packet capture platform, security analysts and incident responders now have a way to complete in-depth, focused analysis in a fraction of the time. Armed with SentryWire and Avalon, incident responders have visibility to specific communications between network endpoints presented with network relationship context for simultaneous team collaboration and information sharing in near real-time.

 

Get Started Today!
Schedule a Free Demo