Get Started

          Meet your mission

          To protect people and networks, governments need exceptional network data — data that’s rich yet lightweight, universal and interlinked, that connects signal and evidence. Powered by the best of open source security technology, Corelight opens up new ways to solve problems and elevates your entire SOC.

          Unlock threat hunting capabilities

          Open up a new world of rich, linked data for hunters, even when traffic is encrypted. Learn how with our free Threat Hunting Guide.

          Escape the alert avalanche

          Automate investigations with better data and SOAR playbooks, reducing fatigue and boosting efficiency.

          Modernize your security strategy

          Wherever your traffic goes, monitor it. Unlock rich network visibility to support compliance with TIC 3.0, RMF, Zero Trust, and other frameworks.

          Corelight certifications

          Contract vehicles
          GSA IT Schedule 70

          No. GS-35F-0119Y

          CDM Tools SIN

          GSA CDM Tools SIN 132-44

          SEWP V

          NASA SEWP contracts NNG15SC03B and NNG15SC

          Certifications
          FIPS 140-2

          Corelight Sensors are verified to comply with the Federal Information Processing Standard 140-2. Read more.

          Authority to Operate (ATO)

          Corelight has an IATO and is operationally in use in defense, civilian, and throughout the defense industrial base.

          National Information Assurance Plan (NIAP)

          Corelight is in process, we can provide additional information request.

          Government Cloud Ready

          Corelight deploys in AWS GovCloud, Azure Government, and Google Cloud for government.

          Integrations

          Corelight dashboard in Splunk showing executables hiding in benign file extensions.
          Corelight dashboard in Splunk showing executables hiding in benign file extensions.
          expand dialog
          Corelight dashboard in Splunk showing executables hiding in benign file extensions.

          More technology partners

          Corelights DNS dashboard in Kibana showing risks like top DNS requests to non-existent domains.
          Corelights DNS dashboard in Kibana showing risks like top DNS requests to non-existent domains.
          expand dialog
          Corelight’s DNS dashboard in Kibana showing risks like top DNS requests to non-existent domains.
          • Native Elastic Security export, ECS compliant
          • Pre-built Kibana dashboards for hunting
          • Customize, filter, and control data ingest
          • Elasticsearch Machine Learning ready

          Have a question? Contact us

          Preferred partners

          Corelight has partnered with leading integrators and value-added resellers in the public sector, ensuring that our customers can continue to work with their preferred partners while instrumenting the power of Zeek at scale in their own environment. Corelight's Technology Partners.