Gatewatcher Overview

What is Gatewatcher?

Our unique technology detects the most advanced threats, made with the most crafted exploitation methods (polymorphism, obfuscation, encoding, ROPchain…) and the threats based on all types of malicious files (ransomware, cryptolocker…).

Trackwatch® can be deployed from two types of devices: GCAP and GCENTER.

GCAP ensures the collection of network traffic flows and a portion of the anlyses. A GCAP is connected to a switch with a mirror port or to a TAP that copies the network traffic. One or more GCAPs can be deployed within an infrastructure, either locally or at remote sites. The GCAP(s) are connected to a GCENTER management device.

The GCENTER nalyses the information sent back by the GCAP, stores it, provides configuration and reporting interfaces, and exports the information to a security information and event management (SIEM).

Buyer's Guide

Download the Intrusion Detection and Prevention Software Buyer's Guide including reviews and more. Updated: May 2021

Gatewatcher Video
Sorry, no reviews are posted about Gatewatcher. Be the first to write a review. It's quick and easy!

If you work for Gatewatcher and want to claim this page, contact
Buyer's Guide
Download our free Intrusion Detection and Prevention Software Report and find out what your peers are saying about Gatewatcher, Darktrace, Cisco, and more!