Corelight quickly makes sense of encrypted traffic without decryption. The Encrypted Traffic Collection allows security analysts to fingerprint SSL & SSH connections, monitor soon-to-expire certificates, detect SSH client brute force attacks, and much more.

Download product specifications
Download product specifications

Perfectly balanced network visibility

a screenshot of log rates graph

100x richer than Netflow / 100x smaller than PCAP / 50+ data types and protocols.

Corelight’s logs are the “Goldilocks” of network data: 100x richer than Netflow and 100x times smaller than PCAP. Covering 50+ data types and protocols and interlinked for lightning-fast search, these logs offer just the right amount of data for security tools and operators. Corelight’s fork, filter, and log data reduction features make it easy to manage log volumes for your SIEM without sacrificing critical network visibility.

Core Collection packages

Corelight Sensors come preloaded with the Core Collection—a curated set of Zeek / Bro packages for detection, data enrichment, and operations.

The Core Collection delivers actionable insights like cryptomining and port scanning detections. It also offers operational controls like tuning log export volumes to manage SIEM costs.

bitcoin fingerprint depiction of data transfer
October 17, 2019

Corelight Raises $50 Million Series C Led by Insight Partners and Accel

grey right arrow
July 16, 2019

Corelight Expands Executive Team with New Vice President of Engineering and Vice President of People

grey right arrow
July 11, 2019

Carahsoft Expands Availability of Network Security Solutions With Addition of Corelight to GSA Schedule and CDM Tools SIN

grey right arrow
June 25, 2019

Corelight Launches New Corelight Cloud Sensor for Amazon Web Services, Ingests Traffic via New Amazon Virtual Private Cloud Traffic Mirroring

grey right arrow
June 11, 2019

Corelight Enhances Detection Capability with Support for MITRE ATT&CK Package

grey right arrow
February 28, 2019

Corelight Launches Corelight Fleet Manager for Seamless, Multi-Sensor Support and Administration for Enterprises with Large Deployments

grey right arrow

Tahawultech: How partners and MSSPs can optimise Corelight’s offerings

grey right arrow

Wired: Meet the Mad Scientist Who Wrote the Book on How to Hunt Hackers

grey right arrow

Dark Reading: Intel Issues Fix for 'Plundervolt' SGX Flaw

grey right arrow

SC Magazine UK: An attack or just a game?

grey right arrow

Washington Post: The Cybersecurity 202: The Sony hack ushered in a dangerous era in cyberspace

grey right arrow

ComputerWeekly: Alleged state hackers adapting to cover their tracks, says NCSC

grey right arrow

RSA Conference 2020

Talk security with our team at RSA 2020. Visit booth #4308.

Learn more