CONTACT US
ad-images-nav_0001_SANs thumb

SANS Protects: The Network

DOWNLOAD WHITE PAPER

ad-images-nav_0009_Threat-hunting-guide

Threat hunting guide

GET THE GUIDE

ad-nav-crowdstrike

Corelight now powers CrowdStrike solutions and services

READ MORE

ad-images-nav_0013_IDS

Alerts, meet evidence.

LEARN MORE ABOUT OUR IDS SOLUTION

ad-images-nav_white-paper

5 Ways Corelight Data Helps Investigators Win

READ WHITE PAPER

ad-images-nav_0000_Thinking-like-a-threat-actor

Thinking like a Threat Actor: Hunting the Ghost in the Machine

WATCH THE WEBCAST

ad-images-nav_0006_Blog

Don't trust. Verify with evidence

READ BLOG

ad-nav-NDR-for-dummies

NDR for Dummies

GET THE WHITE PAPER

ad-nav-video

The Power of Open-Source Tools for Network Detection and Response

WATCH THE WEBCAST

ad-nav-ESG

The Evolving Role of NDR

DOWNLOAD THE REPORT

ad-images-nav_0006_Blog

Detecting 5 Current APTs without heavy lifting

READ BLOG

Explore Corelight evidence in Humio Community Edition

Now available: A free and easy way to learn about Humio and Corelight.

As part of our alliance partnership with CrowdStrike and Humio, Corelight is excited to announce a new collaboration that allows our customers and the community to experience the value of evidence.

Starting today, Corelight example evidence is automatically available on the main screen of Humio Community Edition. The Corelight evidence is a continuous loop of network data taken from a Corelight sensor that includes DNS, HTTP, RDP, files, SSL, SSH, X509, and Suricata IDS detections. The example Corelight evidence is already ingested and parsed in Humio to ensure relevant fields are available for search. You can also use the evidence to explore the dashboards and queries included in the Corelight Sensor package and the Threat Hunting Guide package, both of which are available in the Humio Package Marketplace.

Ready to try it out? Head over to the Humio blog for instructions on how to get started along with suggestions on how to use the sample evidence to find suspicious files, visualize connections using Sankey diagrams, and create custom alerts.

 

By Ed Smith, Senior Product Marketing Manager, Corelight

Search

    Recent Posts