Is there a ‘Z’ in “Vectra”?
This blog builds on a prior post by discussing why our customers come to us as an enterprise solution to support their Zeek deployments.
This blog builds on a prior post by discussing why our customers come to us as an enterprise solution to support their Zeek deployments.
This post will outline some methods Zeek employs to provide visibility into SSH connections.
Learn about the four NSM data types and the four core functions which one can perform with a passive network visibility platform.
Last week, a candidate for a role at Corelight explained his motivation for joining the company: “the world is standardizing on Zeek.” Here's why...
I’m Amber Graner, and I’m excited to join Corelight, Inc as the Director of Community for the open source Zeek project.
Is IPS a feature or a product? I will present my view on the topic, but I’m more interested in hearing what readers think!
Chronicle launched Backstory, a new security analytics platform, and we are pleased to share that Corelight is part of the Chronicle Index Partner...
In this post I examine the statement's relevance and discuss why implementing NSM via passive instrumentation delivers on the promise of the...
We look at the main angles of innovation that are playing out across form factors (on-prem, MSSP, and SaaS) and the elephant in the room that goes...