#NetworkData

2024-09-20

🎉 That’s a wrap on CrowdStrike's Fal.Con 2024!

We had an amazing time showcasing the synergy between broad network data and CrowdStrike’s endpoint insights through our panel discussions, developer talks, and theater presentations. Thanks again to all the incredible speakers!

Missed the action? No worries! Join our upcoming webinar to catch up on all the insights shared: go.corelight.com/strengthen-ne

Team #Corelight is already looking forward to 2025 🌟

#FalCon2024 #Cybersecurity #NetworkData

2023-11-22

Just Posted: Sulagna Saha's article emphasizes the benefits of Forward Networks' Digital Twin technology in combating rampant ransomware attacks, by enhancing inter-device visibility and enabling proactive threat triage, highlighting the need for strong policy frameworks and observability alongside. #DigitalTwin #NetworkData #Ransomware #XFD10
gestaltit.com/tech-field-day/s

2023-06-30

Just Posted: Sulagna Saha's article on Tech Field Day Extra highlights ThousandEyes' focus on end-to-end visibility and their integration with Cisco's Meraki MX, Catalyst, and Nexus Series to provide operators with comprehensive network visibility, aiding in effective IT environment management and facilitating smooth digital transformation.
gestaltit.com/tech-field-day/s
#ApplicationData #CiscoLive2023 #NetworkData #Observability #TFDx

2023-01-17

New from Corelightđź’ˇ:

1. Enhanced IDS rules management functionality

2. Extended analyst visibility around hosts, devices, users, and more

3. Upgraded Corelight Software Sensor to give customers more NDR deployment flexibility

Learn how these new developments from Corelight can seamlessly integrate with and complement your adjacent security investments in this blog ➡️ corelight.com/blog/replace-ids

#CybersecuritySolutions #SecurityAnalytics #NTA #SecurityAnalysts #IncidentResponse #IncidentResponders #NetworkData #NetworkEvidence #SecurityOperations #SecOps #NetworkSecurity #CloudSecurity #Cybersecurity #NetworkDetectionandResponse #NDR #DFIR

2022-12-15

"What hosts are offering SSH on my network?"
"What usernames have been used to login over the past week from an IP address?"
“Can I tell where this device is and how it might be related to the organization?”

These are just a few of the questions that might be on your security team’s mind. Help them get the answers they need to defend your network with Corelight’s latest security analytics collection, the Corelight Entity Collection. The Entity Collection identifies apps and subnets, and summarizes activity for hosts, devices, names, services, certs, users, and domains to help customers track assets and speed investigations via immediate asset context. Learn more in this blog from Vince Stoffer: corelight.com/blog/corelight-l

#SecurityAnalytics #NetworkData #NetworkEvidence #SecurityAnalysts #SecurityOperations #SecOps #NetworkSecurity #Cybersecurity #NTA #NetworkDetectionandResponse #NDR

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst