+
+

Related Products

  • PathSolutions TotalView
    42 Ratings
    Visit Website
  • Blumira
    144 Ratings
    Visit Website
  • ManageEngine OpManager
    1,444 Ratings
    Visit Website
  • Site24x7
    792 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    383 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    432 Ratings
    Visit Website
  • Auvik
    662 Ratings
    Visit Website
  • TelemetryTV
    274 Ratings
    Visit Website
  • Concrete CMS
    284 Ratings
    Visit Website
  • NetBrain
    147 Ratings
    Visit Website

About

Corelight brings you the power of Zeek without Linux issues, NIC problems, or packet loss. Deployment takes minutes, not months. After all, your top people should be threat hunting, not troubleshooting. The most capable platform for understanding and protecting your network is built on open source. You'll have open access to your metadata and the ability to customize and extend your capabilities — together with a vibrant community. We’ve built the leading team of Zeek experts and contributors, and have assembled a world-class support team that continually delights customers with their unparalleled knowledge and fast response times. Proactive, secure, and automatic—when you enable Corelight Dynamic Health Check your Corelight Sensor sends performance telemetry back to Corelight to proactively monitor for things like disk failures or abnormal performance metrics that could indicate a problem.

About

With the cloud architecture and intuitive interface in InsightIDR, it's easy to centralize and analyze your data across logs, network, endpoints, and more to find results in hours—not months. User and Attacker Behavior Analytics, along with insights from our threat intel network, is automatically applied against all of your data, helping you detect and respond to attacks early. In 2017, 80% of hacking-related breaches used either stolen passwords and/or weak or guessable passwords. Users are both your greatest asset and your greatest risk. InsightIDR uses machine learning to baseline your users' behavior, automatically alerting you on the use of stolen credentials or anomalous lateral movement.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Network evidence, investigation, triage, and hunting platform for everyone

Audience

IT teams

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Corelight
Founded: 2013
United States
www.corelight.com

Company Information

Rapid7
Founded: 2000
United States
www.rapid7.com

Alternatives

Fidelis Elevate

Fidelis Elevate

Fidelis Security

Alternatives

NetworkMiner

NetworkMiner

Netresec
Alert Logic

Alert Logic

Fortra
Zeek

Zeek

The Zeek Project
Arctic Wolf

Arctic Wolf

Arctic Wolf Networks
Vectra AI

Vectra AI

Vectra

Categories

Categories

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

AWS Marketplace
AuthPoint
Chronicle
Chronicle SOAR
Confluent
CrowdStrike Falcon
Databricks Data Intelligence Platform
Devo
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Monad
Nucleus
Palo Alto Networks DNS Security Service
Panaseer
PassiveTotal
Rapid7 Command Platform
Sacumen Connector as a Service (CaaS)
StatusGator

Integrations

AWS Marketplace
AuthPoint
Chronicle
Chronicle SOAR
Confluent
CrowdStrike Falcon
Databricks Data Intelligence Platform
Devo
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Monad
Nucleus
Palo Alto Networks DNS Security Service
Panaseer
PassiveTotal
Rapid7 Command Platform
Sacumen Connector as a Service (CaaS)
StatusGator
Claim Corelight and update features and information
Claim Corelight and update features and information
Claim Rapid7 InsightIDR and update features and information
Claim Rapid7 InsightIDR and update features and information