Built atop Core Intelligence, Edge Intelligence allows organizations to strategically deploy GreyNoise sensors in their own environments, capturing first-hand scanning intelligence and baiting attackers with real-world device personas, which can be uniquely customized to match customer infrastructure. This unique insight allows defenders to automatically block targeted attacks before they can compromise critical systems.
Enterprise defenders, security service providers, and advanced research organizations who want to understand and prevent attacks targeting specific devices, industries, or network areas.
Edge Intelligence allows users to deploy GreyNoise Sensors by deploying a lightweight system in their environments and connecting it to the GreyNoise cloud. Once connected, GreyNoise Personas can be deployed to the server, and scanning traffic is captured.
Users can download up to 24 hours of PCAP data from each sensor for detection engineering and triage work and compare what traffic is observed on their Sensors to those running on the GreyNoise global sensor network.
Sensor Packs
Get the ability to deploy as many sensors as needed inside your network
SOC Triage and Response, CTI Enrichment, and Threat Hunting and Research
Custom Personas
Request GreyNoise build a sensor persona for your specific use case and Need
SOC Triage and Response, CTI Enrichment, and Threat Hunting and Research
PCAP Data Extension
Get up to 30 days of PCAP data export for all sensors deployed
CTI Enrichment and Threat Hunting and Research
Sift
Get a custom version of Sift that provides insight into the payloads captured for sensors deployed only in your environment.
SOC Triage and Response, CTI Enrichment, and Threat Hunting and Research
IP Feed
Get a feed of IPs collected only by your sensors for perimeter blocking and triage
SOC Triage and Response
The packages shown below are just examples. Each GreyNoise engagement can be fully customized based on customer requirements, technical environment, and usage.
For a medium-sized MSSP providing SOC and vulnerability intelligence services to their clients, they might consider: