28 Results for:

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption

sponsored by Corelight Published: 21 May 2019 White Paper

The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source...

View Now

Why Corelight Is Your Best Next Move in Enterprise Security

sponsored by Corelight Published: 27 Feb 2019 White Paper

The most sophisticated enterprises continue to be breached, attacked, and compromised. Most large organizations have deployed endpoint security solutions, but often times are still not enough. As a result, many ...

View Now

The Power of Bro and Why You Should Include It in Your Security Infrastructure

sponsored by CoreLight Published: 11 Feb 2019 Video

Tune into this webinar as Matt Bromiley of SANS Institute and Seth Hall of CoreLight explain the power of Bro (now known as Zeek), where it fits in the security landscape and how it can help incident responders do ...

View Now

How You Can Make Incident Response Faster and More Efficient

sponsored by CoreLight Published: 08 Feb 2019 Webcast

Watch this webcast to learn about Zeek—an open-source network security monitor that is formally known as Bro—and see how it can transform network traffic into high-fidelity data streams for faster incident ...

View Now

5 Ways Bro Gives You Better Data for Incident Response and Threat Hunting

sponsored by CoreLight Published: 08 Feb 2019 Webcast

Watch this webcast to learn about Zeek—formally known as Bro—an open-source network security monitor that empowers incident responders and threat hunters to locate and prevent attacks by providing high-fidelity ...

View Now

How Bro Provides Better Data and Enables 10x Faster Incident Response

sponsored by CoreLight Published: 07 Feb 2019 Product Overview

Watch this webcast for an overview of how Bro—now known as Zeek—help creates better network data, and how it can help incident responders and threat hunters cut the time required to resolve typical incidents by a ...

View Now

Dramatically Reduce Incident Response Time with Splunk® and Bro

sponsored by CoreLight Published: 07 Feb 2019 Product Overview

Watch this webcast to learn about open-source network security monitor Bro—now known as Zeek—which turns network traffic into high-fidelity data streams that summarize and organize network events by protocol.

View Now

Universities, Network Security, and Bro: A Roundtable Discussion

sponsored by CoreLight Published: 06 Feb 2019 Webcast

Watch this webinar to learn about open-source network security monitor, Bro—now known as Zeek—and how companies and universities use it to transform raw network traffic into high-fidelity data streams for analysis ...

View Now

A Technical Introduction to Bro: Network Security's Best Kept Secret

sponsored by CoreLight Published: 06 Feb 2019 Webcast

Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.

View Now

An Introduction to Threat Hunting with Bro Zeek

sponsored by CoreLight Published: 05 Feb 2019 Product Demo

Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt ...

View Now