1. Builds software identity fingerprints
Learn what software is communicating
To detect and stop attacks on your networks, you first need a clear understanding of all software, hosts, and processes and how they’re communicating. To identify your complete application topology, Edgewise builds fingerprints for every communicating workload. Fingerprints are based on immutable identity attributes sourced directly from the kernel and include information such as the SHA256 hash, file path, code-signing certificates, and loaded modules. Edgewise ensures the fingerprints are resilient to software updates.