Quick FIX® log management: How metadata simplifies financial protocol tracking (and how Corelight’s platform can help)
Learn how Corelight and Zeek streamline financial protocol tracking, improve network security, and simplify compliance.
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Corelight recognized as a leader in the 2025 Gartner Magic Quadrant™ for network detection and response
Feel free to edit this text to reflect your unique voice and message. Tell visitors what you do, why you do it, and what sets you apart.
Learn how Corelight and Zeek streamline financial protocol tracking, improve network security, and simplify compliance.
While I have used log collection and SIEM platforms to review Zeek transaction logs, it is not necessary to wait for a SIEM before collecting...
Announcing the Corelight Cloud Sensor, deployable in AWS and capable of ingesting traffic directly from the new Amazon VPC traffic mirroring feature.
In this first of three parts, I will introduce TLS and demonstrate a clear-text HTTP session as interpreted by Corelight logs.
This blog builds on a prior post by discussing why our customers come to us as an enterprise solution to support their Zeek deployments.
Last week, a candidate for a role at Corelight explained his motivation for joining the company: “the world is standardizing on Zeek.” Here's why...
In this post I will use Zeek logs to demonstrate alternative ways to analyze encrypted HTTP traffic.
Welcome to the first in a regular series of blog posts on network security monitoring (NSM). I look forward to you joining me on this journey.
With Corelight’s 1.15 release, we help figure out the host names associated with an IP address in prior network activity. Here's how it works.