Skip to content
  • There are no suggestions because the search field is empty.
PROTECTING OVER $1B IN DAILY TRADES
DEFENDING ENERGY FOR 32+M U.S. USERS
SECURING NETWORKS FOR 52K+ TRANSPORT VEHICLES
PROTECTING OVER $10T IN MANAGED ASSETS
SECURING 16+M ANNUAL PATIENT VISITS
Product

Zeek®

With more than 10,000 deployments worldwide, Zeek® is the world's most widely used network security monitoring platform and is the foundation for Corelight evidence.

The gold standard for network monitoring

Zeek transforms network traffic into compact, high-fidelity transaction logs, allowing defenders to understand activity, detect attacks, and respond to them. Zeek sits out-of-band, on-prem or in the cloud. It gathers metadata and extracted files, and formats everything for input into any SIEM or XDR. Zeek provides the evidence that is foundational to Corelight’s Open NDR Platform.

cyber-monitoring-code

How it works

Free Zeek cheatsheets

A selection of cheatsheets for understanding what’s in Zeek metadata. 

ig-site-zeek-logs-cheatsheet-three-pages--cropped

Close the case on ransomware

In high stakes ransomware investigations, many security teams are unable to answer key questions and default to worst-case assumptions. With complete visibility from Corelight, teams can avoid costly overreactions. One customer, when confronted with a $10 million ransomware demand, used Corelight to prove the exfiltrated data being held for ransom had no real value while providing legal aircover for refusing to pay the ransom.

ransomware-tablet-cloud-ebook_frame