protocol-level network traffic analysis
Performs deep packet inspection and protocol dissection on network traffic to extract granular details about communication patterns, application behavior, and protocol-level anomalies. Leverages Zeek's battle-tested engine to decode and analyze hundreds of network protocols.
encrypted traffic behavior profiling
Analyzes behavioral patterns in encrypted network traffic without decrypting payloads, extracting metadata such as certificate information, TLS versions, cipher suites, and communication patterns to identify suspicious encrypted connections.
custom detection rule development and deployment
Enables creation of custom detection rules using Zeek scripting language to identify specific threats, attack patterns, or policy violations. Supports deployment of custom rules to detect organization-specific threats.
network baseline establishment and comparison
Establishes baseline profiles of normal network behavior and enables comparison of current traffic against these baselines to identify deviations. Supports creation of organization-specific network behavior models.
threat intelligence feed integration
Integrates external threat intelligence feeds with network analysis to automatically correlate observed network activity against known indicators of compromise, malicious IPs, and threat signatures.
network traffic volume and performance analytics
Analyzes network traffic volume, bandwidth consumption, and performance metrics to identify capacity issues, traffic patterns, and potential DDoS or resource exhaustion attacks.
siem and security tool ecosystem integration
Integrates Corelight's network analysis capabilities with existing SIEM platforms, threat intelligence systems, and other security tools through standardized data formats and APIs.
structured security event log generation
Converts raw network traffic analysis into structured, machine-readable logs organized by connection type, application, and protocol. Generates standardized event records that integrate seamlessly with SIEM platforms and threat intelligence systems.
+7 more capabilities