+
+

Related Products

  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • Blumira
    146 Ratings
    Visit Website
  • ManageEngine OpManager
    1,628 Ratings
    Visit Website
  • Site24x7
    907 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    484 Ratings
    Visit Website
  • Auvik
    675 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • TelemetryTV
    275 Ratings
    Visit Website
  • Eldermark
    40 Ratings
    Visit Website
  • DataHub
    10 Ratings
    Visit Website

About

Corelight brings you the power of Zeek without Linux issues, NIC problems, or packet loss. Deployment takes minutes, not months. After all, your top people should be threat hunting, not troubleshooting. The most capable platform for understanding and protecting your network is built on open source. You'll have open access to your metadata and the ability to customize and extend your capabilities — together with a vibrant community. We’ve built the leading team of Zeek experts and contributors, and have assembled a world-class support team that continually delights customers with their unparalleled knowledge and fast response times. Proactive, secure, and automatic—when you enable Corelight Dynamic Health Check your Corelight Sensor sends performance telemetry back to Corelight to proactively monitor for things like disk failures or abnormal performance metrics that could indicate a problem.

About

Threat detection provides deep inspection of every single network packet including transported data with: Network protocol discovery and validation – easily check unknown and hidden protocols. Machine Learning algorithms – proactive traffic risk-scoring. Network steganography detection of hidden network traffic, including data leaks, espionage channels, and botnets. Proprietary steganography detection algorithms – effective way of uncovering methods of hiding information. Proprietary steganography signature database – comprehensive collection of known network steganography methods. Forensics to better measure the ratio of security events against source of traffic. Extraction of high-risk network traffic – easy to analyze and focus on specific threat levels. Storage of processed traffic metadata in extended format – faster trend analysis.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Network evidence, investigation, triage, and hunting platform for everyone

Audience

Cybersecurity solution for anyone

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Corelight
Founded: 2013
United States
www.corelight.com

Company Information

Cryptomage
Founded: 2015
Poland
cryptomage.io/cybereye

Alternatives

Fidelis Elevate

Fidelis Elevate

Fidelis Security

Alternatives

NetworkMiner

NetworkMiner

Netresec
Zeek

Zeek

The Zeek Project
Telesoft CERNE

Telesoft CERNE

Telesoft
NexVision

NexVision

NexVision Lab

Categories

Categories

Integrations

AWS Marketplace
Amazon S3
Azure Marketplace
Chronicle
Confluent
CrowdStrike Falcon
Elastic Cloud
EndaceProbe
Forcepoint Behavioral Analytics
Gigamon
Google Cloud Platform
Humio
Palo Alto Networks DNS Security Service
ReversingLabs
Splunk Cloud Platform
Splunk SOAR
Sumo Logic
ThreatQ
cPacket

Integrations

AWS Marketplace
Amazon S3
Azure Marketplace
Chronicle
Confluent
CrowdStrike Falcon
Elastic Cloud
EndaceProbe
Forcepoint Behavioral Analytics
Gigamon
Google Cloud Platform
Humio
Palo Alto Networks DNS Security Service
ReversingLabs
Splunk Cloud Platform
Splunk SOAR
Sumo Logic
ThreatQ
cPacket
Claim Corelight and update features and information
Claim Corelight and update features and information
Claim Cryptomage and update features and information
Claim Cryptomage and update features and information