What is Gatewatcher?
Our unique technology detects the most advanced threats, made with the most crafted exploitation methods (polymorphism, obfuscation, encoding, ROPchain…) and the threats based on all types of malicious files (ransomware, cryptolocker…).
Trackwatch® can be deployed from two types of devices: GCAP and GCENTER.
GCAP ensures the collection of network traffic flows and a portion of the anlyses. A GCAP is connected to a switch with a mirror port or to a TAP that copies the network traffic. One or more GCAPs can be deployed within an infrastructure, either locally or at remote sites. The GCAP(s) are connected to a GCENTER management device.
The GCENTER nalyses the information sent back by the GCAP, stores it, provides configuration and reporting interfaces, and exports the information to a security information and event management (SIEM).
Download the Intrusion Detection and Prevention Software Buyer's Guide including reviews and more. Updated: May 2021