All resources sponsored by:

Corelight

1 - 25 of 28 Matches
Shake the Box: How to Get Encrypted Traffic Insights Without Decryption
sponsored by Corelight
WHITE PAPER:The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.
Posted: 21 May 2019 | Published: 21 May 2019
Get This Now


Why Corelight Is Your Best Next Move in Enterprise Security
sponsored by Corelight
WHITE PAPER:The most sophisticated enterprises continue to be breached, attacked, and compromised. Most large organizations have deployed endpoint security solutions, but often times are still not enough. As a result, many companies are adding network-wide visibility for protection. In this white paper, learn about the benefits of Corelight Sensors.
Posted: 27 Feb 2019 | Published: 27 Feb 2019
Get This Now


The Power of Bro and Why You Should Include It in Your Security Infrastructure
sponsored by Corelight
VIDEO:Tune into this webinar as Matt Bromiley of SANS Institute and Seth Hall of CoreLight explain the power of Bro (now known as Zeek), where it fits in the security landscape and how it can help incident responders do their jobs quickly and effectively.
Posted: 11 Feb 2019 | Premiered: 11 Feb 2019
Get This Now


How You Can Make Incident Response Faster and More Efficient
sponsored by Corelight
WEBCAST:Watch this webcast to learn about Zeek—an open-source network security monitor that is formally known as Bro—and see how it can transform network traffic into high-fidelity data streams for faster incident detection.
Posted: 08 Feb 2019 | Premiered: Feb 8, 2019
Get This Now


5 Ways Bro Gives You Better Data for Incident Response and Threat Hunting
sponsored by Corelight
WEBCAST:Watch this webcast to learn about Zeek—formally known as Bro—an open-source network security monitor that empowers incident responders and threat hunters to locate and prevent attacks by providing high-fidelity data streams for traffic analysis.
Posted: 08 Feb 2019 | Premiered: Feb 8, 2019
Get This Now


Dramatically Reduce Incident Response Time with Splunk® and Bro
sponsored by Corelight
PRODUCT OVERVIEW:Watch this webcast to learn about open-source network security monitor Bro—now known as Zeek—which turns network traffic into high-fidelity data streams that summarize and organize network events by protocol.
Posted: 07 Feb 2019 | Published: 07 Feb 2019
Get This Now


How Bro Provides Better Data and Enables 10x Faster Incident Response
sponsored by Corelight
PRODUCT OVERVIEW:Watch this webcast for an overview of how Bro—now known as Zeek—help creates better network data, and how it can help incident responders and threat hunters cut the time required to resolve typical incidents by a factor of 10 or more.
Posted: 07 Feb 2019 | Published: 07 Feb 2019
Get This Now


A Technical Introduction to Bro: Network Security's Best Kept Secret
sponsored by Corelight
WEBCAST:Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019
Get This Now


Universities, Network Security, and Bro: A Roundtable Discussion
sponsored by Corelight
WEBCAST:Watch this webinar to learn about open-source network security monitor, Bro—now known as Zeek—and how companies and universities use it to transform raw network traffic into high-fidelity data streams for analysis and threat detection.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019
Get This Now


Transform Network Traffic into High-fidelity Logs for Analysis
sponsored by Corelight
PRODUCT OVERVIEW:Watch this webinar to learn about an open source framework designed to transform network traffic into high-fidelity logs that summarize activity, and automate traffic analysis to help you focus on finding the attacker.
Posted: 05 Feb 2019 | Published: 05 Feb 2019
Get This Now


An Introduction to Threat Hunting with Bro Zeek
sponsored by Corelight
PRODUCT DEMO:Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.
Posted: 05 Feb 2019 | Premiered: 05 Feb 2019
Get This Now


"Bro" Open-Source Framework with Alan Saldich
sponsored by Corelight
WEBCAST:In this webcast, listen to Chief Marketing Officer at Corelight, Alan Saldich, talk about the open source software Bro, now known as Zeek. Learn how CoreLight's sensors help enable the large-scale usage of Bro by retrieving and organizing the data you need to track network traffic and performance.
Posted: 05 Feb 2019 | Premiered: Feb 5, 2019
Get This Now


A Revolution in Network Security Monitoring Is Underway: Are You Ready?
sponsored by Corelight
WEBCAST:Watch this video to hear from networking industry analyst Zeus Kerravala to learn how cutting-edge organizations are leading a security monitoring revolution, away from scattershot network visibility toward a unified, comprehensive visibility approach with tools purpose-built for security teams.
Posted: 04 Feb 2019 | Premiered: Feb 4, 2019
Get This Now


How to Reduce Security Risks through Better DNS Visibility & Analysis
sponsored by Corelight
WEBCAST:In this webcast, find out how you can drive visibility into DNS traffic so that you can create a strong security analytics strategy that enables you to reduce risks for your network.
Posted: 04 Feb 2019 | Premiered: Jan 9, 2019
Get This Now


Network Visibility and Using "Bro" with Vincent Stoffer
sponsored by Corelight
WEBCAST:Watch this video to hear Director of Customer Solutions at Corelight, Vincent Stoffer, discuss network visibility and threat hunting as well as pairing the company's hardware appliance with the open-source software, Bro, now known as Zeek—enabling security teams to use Bro at an enterprise scale for accurate network traffic analysis.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019
Get This Now


5 Reasons Corelight Gives You Better Data for Incident Response and Threat Hunting
sponsored by Corelight
PRODUCT OVERVIEW:Download this white paper to learn about a product that can give you a holistic view of your network and turn network traffic into high-fidelity data for analysis.
Posted: 31 Jan 2019 | Published: 31 Jan 2019
Get This Now


Tuning Your Log Volume
sponsored by Corelight
WHITE PAPER:In this white paper, learn how filtering can help reduce log volume and make it more manageable and useful—rather than letting it unintentionally fill up disks or drive up SIEM costs.
Posted: 31 Jan 2019 | Published: 31 Jan 2019
Get This Now


7 Reasons to Switch from Open-Source Bro to Corelight Sensor
sponsored by Corelight
PRODUCT OVERVIEW:In this white paper, learn about the Corelight Sensor, which was designed to simplify the notoriously complicated open source Bro deployment and management. Also, explore 7 reasons to switch from the open source format to a Corelight Sensor.
Posted: 30 Jan 2019 | Published: 30 Jan 2019
Get This Now


Corelight Sensor: A Typical Use Case
sponsored by Corelight
BROCHURE:Faced with constant alerts from various security devices (IDS, anti-malware, anti-spam, etc.) today's companies still suffer from theft, false positives, and a general lack of visibility into network traffic. Download this white paper to learn about a network monitoring product that can help you quickly get to the bottom of threats.
Posted: 30 Jan 2019 | Published: 30 Jan 2019
Get This Now


Network Traffic Analysis
sponsored by Corelight
PRODUCT OVERVIEW:A network IDS typically looks for potential attacks based on monitoring traffic for known behavior or discrete characteristics. But, they often lack the power to identify sophisticated attacks. Read on to discover how your security team could benefit from a networking monitoring framework with sophisticated network traffic analysis.
Posted: 29 Jan 2019 | Published: 29 Jan 2019
Get This Now


Simplify Bro Deployments with a Corelight Sensor
sponsored by Corelight
PRODUCT OVERVIEW:Bro, now known as Zeek, is a framework for transforming network traffic into actionable data for analysis and more. Although it's relatively easy to get started with Bro, it's much more challenging to run the software efficiently and at scale. Read this white paper to learn about the Corelight Sensor, which is designed to simplify Bro deployments.
Posted: 28 Jan 2019 | Published: 28 Jan 2019
Get This Now


Case Study: Top University Builds Custom Detection Scripts
sponsored by Corelight
CASE STUDY:Learn how this top research university was able to meet all of their network traffic analysis requirements with fast network log searches, expanded custom detection scripting capabilities, and more.
Posted: 28 Jan 2019 | Published: 28 Jan 2019
Get This Now


Case Study: Security Team Sees 95% Reduction in Incident Response Time
sponsored by Corelight
CASE STUDY:In this case study, find out how Corelight provided Education First with real-time, detailed insight into network traffic spanning multiple business sites, as well as a reduced average incident response time from around 3 hours to less than 10 minutes (95% reduction.)
Posted: 28 Jan 2019 | Published: 28 Jan 2019
Get This Now


Ten Strategies of a World-Class Security Operations Center
sponsored by Corelight
WEBCAST:The global talent shortage for cybersecurity skills means that the average SOC is a lean group with the enormous task of protecting the organization. Therefore, it's of critical importance to design and operate your SOC to maximize efficiency. In this webcast, learn best practices that can transform a common security team into an elite SOC.
Posted: 28 Jan 2019 | Premiered: May 23, 2018
Get This Now


Corelight Webcast: New SIEM on the Block -- Meet Humio
sponsored by Corelight
WEBCAST:Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.
Posted: 28 Jan 2019 | Premiered: Aug 21, 2018
Get This Now


1 - 25 of 28 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement