Network Security Monitoring data: Types I, II, and III
This blog post explains three levels of analysis and how encryption has affected NSM, demonstrating that NSM remains relevant, despite encryption.
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.
This blog post explains three levels of analysis and how encryption has affected NSM, demonstrating that NSM remains relevant, despite encryption.
Here are the three most important decisions Gary Reiner, former CIO of General Electric, made with respect to the success of GE-CIRT.
Collecting and analyzing core NSM data types & with host-based security provide the best chance for CIRTs to detect and respond to the sorts of...