Suricata + Zeek: How it Works

Logo
Presented by

Corelight

About this talk

Put defenders on top with alerts integrated into evidence. Corelight delivers the foundation next-level incident response by integrating the open source powerhouses Zeek and Suricata. With Suricata alerts embedded directly into Zeek logs, analysts can see linked activity across a host of vital protocols including as DNS and HTTP. This helps them make faster decisions, and see patterns of activity across your whole network. Both Suricata and Zeek let you create solutions that fit your environment through rapid customization. You can load any open source ruleset you want, then feed the alerts into scripts you’ve written for event handling. This leads to real security impact, like when it allowed our community to respond to Curveball in just one day.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (21)
Subscribers (910)
Corelight transforms network and cloud activity into evidence so that data-first defenders can stay ahead of ever-changing attacks. Delivered by our open
NDR platform, Corelight’s comprehensive, correlated evidence gives you unparalleled visibility into your network. This evidence allows you to unlock new
analytics, investigate faster, hunt like an expert, and even disrupt future attacks. Our on-prem and cloud sensors go anywhere to capture structured,
industry-standard telemetry and insights that work with the tools and processes you already use. Corelight’s global customers include Fortune 500 compani…