CONTACT US
forrester wave report 2023

Close your ransomware case with Open NDR

SEE HOW

ad-nav-crowdstrike

Corelight now powers CrowdStrike solutions and services

READ MORE

ad-images-nav_0013_IDS

Alerts, meet evidence.

LEARN MORE ABOUT OUR IDS SOLUTION

ad-images-nav_white-paper

5 Ways Corelight Data Helps Investigators Win

READ WHITE PAPER

glossary-icon

10 Considerations for Implementing an XDR Strategy

READ NOW

ad-images-nav_0006_Blog

Don't trust. Verify with evidence

READ BLOG

ad-nav-NDR-for-dummies

NDR for Dummies

GET THE WHITE PAPER

video

The Power of Open-Source Tools for Network Detection and Response

WATCH THE WEBCAST

ad-nav-ESG

The Evolving Role of NDR

DOWNLOAD THE REPORT

ad-images-nav_0006_Blog

Detecting 5 Current APTs without heavy lifting

READ BLOG

g2-medal-best-support-ndr-winter-2024

Network Detection and Response

SUPPORT OVERVIEW

 

Next-Generation SIEM: Corelight is the Data of Choice

For years, the mantra for achieving visibility into potential threats has been the trio of EDR, NDR, and SIEM. These components form the foundation of a robust security posture, with EDR and NDR offering the depth and breadth needed to monitor activities across endpoints and networks.

As environments have become increasingly complex, the inclusion of additional data sources such as email, NGFW, SSE/SASE, and other sources has grown in importance. These sources complement the essential duo of EDR and NDR yet do not replace their critical roles. EDR is indispensable for its granular view of endpoint activities, while NDR casts a broader net, capturing the big picture across the network. This visibility is especially crucial given the insights from the CrowdStrike 2024 Global Threat Report, which highlights that attackers have adapted to the enhanced visibility of traditional EDR and are targeting less fortified areas of the network (pg. 24).

However, the true combined power of EDR and NDR can only be unleashed when paired with an advanced SIEM capable of combining and contextualizing these data streams. This is where traditional SIEMs fall short, often being too slow, complex, and costly to meet the needs of modern SOCs. Enter modern solutions like CrowdStrike's Next-Gen SIEM, designed to be more streamlined, efficient, and cost-effective.

But let's be clear: not all network data is created equal. Legacy IDS are notorious for their high noise levels and inflexibility. Perimeter defenses, while necessary, lack the visibility and customization needed for today’s dynamic environments, and other network data sources intended for different purposes only add to the noise and inflated costs without providing meaningful context (I’m looking at you firewall debug logs!).

At Corelight, we understand that an open approach is paramount. By leveraging open source technology such as Zeek and Suricata, organizations can tap into over two decades of community-driven insights. This open core approach ensures that you're not bound by proprietary constraints; you own your detections, and you tailor your data management to suit your organization's unique needs.

Our commitment to openness has led to significant collaborations with industry titans like CrowdStrike. Unlike other NDR vendors, we have been integrating our full data streams with SIEM vendors for years, giving customers fine-grained control over filtering and export. We’ve provided this level of control even before CrowdStrike’s acquisition of Humio, which underpins the foundation of Falcon Next-Gen SIEM. Corelight has a history as CrowdStrike’s go-to source for network data integrated into CrowdStrike's Network Detection Services, the first third-party Falcon LogScale dashboards and the first NDR enhanced by Falcon Threat Intelligence. Today, we add yet another such example…

xdr incident dashboard
When CrowdStrike required third-party data to demonstrate the capabilities of their Next-Gen SIEM, Corelight was their data of choice (watch the video).

The General Availability of Falcon Next-Gen SIEM marks a milestone for our shared customers, emphasizing an open approach that not only facilitates rapid detection across all data sources but also empowers organizations with greater control over their data and detections.

Corelight’s support for Falcon Next-Gen SIEM extends beyond basic record store export with, dashboards, queries, and real-time enrichment capabilities that reduce MTTR through:

  • Risk-based alert triage: Corelight alerts linked to vulnerabilities flagged by Falcon Spotlight enable responders to focus on the most critical indicators.
  • Expanded Falcon detection: Corelight augments the Falcon suite by applying Intelligence Premium rules at the network level, orchestrating a more comprehensive defense strategy.
  • Streamlined asset inventory and response: By pre-correlating Corelight Entity Collection logs with Falcon Sensor IDs, SOC teams can identify unmanaged endpoints with greater speed and pivot seamlessly between NDR and EDR data.

These unique integrations exemplify how Corelight network evidence, enriched with Falcon's telemetry, can enhance next-generation SIEM workflows, delivering insights in near real-time to accelerate response.

In an era where threats are omnipresent and ever-changing, having the right data and tools isn't just a luxury—it's a necessity. If you're looking to experience how Corelight can revolutionize the Falcon platform, we invite you to try it firsthand. Reach out to sign up for one of our engaging, gamified, capture-the-flag events.

Recent Posts