Corelight puts you in position to see your network like no one else can. Built from the bottom up for security operators, our data captures over 50 protocols for extraordinary breadth and vital detail across your entire environment.
Corelight Sensors come preloaded with Core Collection Zeek packages that help you enrich data and detect behaviors like cryptomining and port scanning. But that’s just the start. Our open-core model lets you choose packages from our vibrant community or write your own scripts, ensuring you’re always a step ahead.
Corelight Co-founders Receive Prestigious IEEE Test of Time Award
Corelight Announces Full Support for Elastic Common Schema for Simplified Search and Analytics Capabilities
Corelight Raises $50 Million Series C Led by Insight Partners and Accel
SC Magazine UK: University supercomputers shut down over cryptocurrency mining malware
Journal of Cyber Policy: Data, AI, and Monitoring in Cybersecurity
The CyberWire Daily Podcast: 5.12.20
Corelight’s wildly popular Capture the Flag (CTF) events are now online! Participants of all levels can have fun and practice threat hunting thanks to 1:1 in-game support offered by Corelight’s technical experts. Every Tuesday and Thursday through June 4th!
Apr 7, 2020 to Jun 4, 2020 This is a remote eventRegister now
Elastic - Open Season: Building a Threat Hunting Program with Open Source Tools
7 Ways to Find Encrypted Network Threats Without Decryption
Splunk - How to Eliminate Alert Fatigue by Turbo-Charging SOAR with NSM