Threat detection
Illuminate and disrupt attacks hidden in your network. Corelight Open NDR gives you unmatched network visibility and precision-crafted detections to catch today’s evasive threats. Backed by AI and workflow automation, you move from alert to action—faster.
Multi-layered detections
Corelight delivers a comprehensive suite of network security analytics that helps organizations identify more than 100 adversarial TTPs across the MITRE ATT&CK® spectrum. Corelight collects and analyzes contextual data and applies a multi-layered detection strategy that combines AI and machine learning, behavioral analytics, curated signatures, along with threat intelligence to deliver prioritized aggregated alerts based on risk.
AI for threat detection
Move from alert to action—faster
EDR evasion and encrypted traffic coverage
Detect post-exploitation behavior and threats that evade endpoint controls—such as credential access, DNS tunneling, or anomalous SMB usage. See and detect across east-west traffic, unmanaged devices, and encrypted sessions, where EDR often has blind spots.
High-fidelity, low noise alerts
Targeted detections for high-value threat behaviors like lateral movement, C2 communication, encrypted traffic misuse, and exfiltration that are precise and context-aware - dramatically reducing false positives.
Faster triage, quicker response
Corelight enriches detections with AI-driven automations - providing evidence-backed summaries, guided triage, and analyst-ready workflows to accelerate investigations. See the "why" behind every threat, so you can validate and investigate faster.The Corelight difference
- Backed by forensic-grade network telemetry, enabling complete visibility into attacker behavior
- Targeted detections for high-value threat behaviors like lateral movement, C2 communication, encrypted traffic misuse, and exfiltration
- Built on open frameworks so you can create or extend detection logic
- Supported by curated community-contributed behavioral detections used by the world’s leading SOC teams
Top 5 reasons why modern SOCs need multi-layered detections
Faced with increasing attacks, a complex threat landscape, a larger attack surface, and pressure to optimize resources, modern SOCs need multi-layered detections as part of their network security.
Open NDR - integrated
analytics capabilities
Triage with Investigator
Easy-to-use, AI-assisted, SaaS workflow dashboard
Network security monitoring with Zeek®
A complete view of every connection for analysis, investigation, and hunting
IDS with Suricata®
Signature-based IDS alerts from Suricata with Zeek® network evidence
Static file analysis
Detect malware threats with pattern-based detection through YARA rules, the standard in malware analysis.