Our collections of insights and detections help you understand your network in unparalleled detail and respond to threats quickly.

Command and Control (C2) icon

C2 Collection

Detect known and unknown command and control activity

Encrypted Traffic Insights icon

Encrypted Traffic Collection

Find out what matters about encrypted connections

Core Collection icon

Core Collection

Detect port scanning, cryptomining, lateral movement and more