CONTACT US
ad-images-nav_0001_SANs thumb

SANS Protects: The Network

DOWNLOAD WHITE PAPER

ad-images-nav_0009_Threat-hunting-guide

Threat hunting guide

GET THE GUIDE

ad-nav-crowdstrike

Corelight now powers CrowdStrike solutions and services

READ MORE

ad-images-nav_0013_IDS

Alerts, meet evidence.

LEARN MORE ABOUT OUR IDS SOLUTION

ad-images-nav_white-paper

5 Ways Corelight Data Helps Investigators Win

READ WHITE PAPER

ad-images-nav_0000_Thinking-like-a-threat-actor

Thinking like a Threat Actor: Hunting the Ghost in the Machine

WATCH THE WEBCAST

ad-images-nav_0006_Blog

Don't trust. Verify with evidence

READ BLOG

ad-nav-NDR-for-dummies

NDR for Dummies

GET THE WHITE PAPER

ad-nav-video

The Power of Open-Source Tools for Network Detection and Response

WATCH THE WEBCAST

ad-nav-ESG

The Evolving Role of NDR

DOWNLOAD THE REPORT

ad-images-nav_0006_Blog

Detecting 5 Current APTs without heavy lifting

READ BLOG

Government Network Security

Government Network Security

Corelight gives federal, state and local governments the advantage in network defense. Corelight's open network detection and response (NDR) platform delivers insights that protect citizens and data from cyberattacks.

Meet your mission

To protect people and networks, governments need exceptional network data — data that’s rich yet lightweight, universal and interlinked, that connects signal and evidence. Powered by the best of open source security technology, Corelight opens up new ways to solve problems and elevates your entire SOC.

Unlock threat hunting capabilities

Open up a new world of rich, linked data for hunters, even when traffic is encrypted. Learn how with our free Threat Hunting Guide.

Escape the alert avalanche

Automate investigations with better data and SOAR playbooks, reducing fatigue and boosting efficiency.

Implement Zero Trust Architecture

Zero Trust architectures require uncompromising network visibility to support continuous verification and deep, dark investigations.

Corelight certifications

Contract vehicles
GSA IT Schedule 70

No. GS-35F-0119Y

CDM Tools SIN

GSA CDM Tools SIN 132-44

SEWP V

NASA SEWP contracts NNG15SC03B and NNG15SC

Certifications
FIPS 140-2

Corelight Sensors are verified to comply with the Federal Information Processing Standard 140-2. Read more.

Authority to Operate (ATO)

Corelight has an IATO and is operationally in use in defense, civilian, and throughout the defense industrial base.

National Information Assurance Plan (NIAP)

Corelight is certified. We can provide additional information on request. 

Government Cloud Ready

Corelight deploys in AWS GovCloud, Azure Government, and Google Cloud for government.

Integrations

Corelight dashboard in Splunk showing executables hiding in benign file extensions.
Corelight dashboard in Splunk showing executables hiding in benign file extensions.
expand dialog
Corelight dashboard in Splunk showing executables hiding in benign file extensions.

More technology partners

Corelights DNS dashboard in Kibana showing risks like top DNS requests to non-existent domains.
Corelights DNS dashboard in Kibana showing risks like top DNS requests to non-existent domains.
expand dialog
Corelight’s DNS dashboard in Kibana showing risks like top DNS requests to non-existent domains.
  • Native Elastic Security export, ECS compliant
  • Pre-built Kibana dashboards for hunting
  • Customize, filter, and control data ingest
  • Elasticsearch Machine Learning ready

Have a question? Contact us

Preferred partners

Corelight has partnered with leading integrators and value-added resellers in the public sector, ensuring that our customers can continue to work with their preferred partners while instrumenting the power of Zeek at scale in their own environment. Corelight's Technology Partners.

Have questions?

Talk with one of our experts today.

CONTACT US