Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Corelight offers the advantages of Zeek without the complications associated with Linux, network interface card issues, or the risk of packet loss. Setting it up is a matter of minutes rather than an extensive timeline, allowing your skilled personnel to focus on threat hunting instead of resolving technical glitches. This robust platform, rooted in open-source technology, provides you with full access to your metadata, enabling customization and extension of your capabilities, all while being part of an engaging community. We have assembled a top-tier team of Zeek specialists and contributors, supported by a world-class customer care team that consistently impresses clients with their exceptional expertise and quick response times. With the proactive and secure Corelight Dynamic Health Check feature activated, your Corelight Sensor transmits performance data back to Corelight, allowing for the early detection of potential issues like disk failures or unusual performance metrics. This ensures that your network remains secure and operationally efficient at all times. Ultimately, Corelight empowers organizations to safeguard their networks with confidence and efficiency.
Description
HookProbe is an innovative open-source intrusion detection and prevention system (IDS/IPS) designed to operate on Raspberry Pi and edge computing devices. By integrating eBPF/XDP for kernel-level packet filtering with advanced machine learning for threat classification, it provides a self-sufficient network security solution that does not rely on cloud services.
The system architecture features components like NAPSE, which handles AI-driven packet inspection; HYDRA, which manages the threat intelligence pipeline; SENTINEL, serving as the machine learning classification engine; and AEGIS, which orchestrates autonomous defense mechanisms. Remarkably, a single Raspberry Pi 5 can effectively manage over 11 million security events, accurately classify 177,000 machine learning verdicts, and monitor more than 11,800 attacker IP addresses—all without human intervention.
Notable functionalities include:
- Quick installation process taking only five minutes on a Raspberry Pi 5 or any compatible Linux device
- High-speed packet filtering and DDoS protection through eBPF/XDP
- Machine learning-driven threat classification categorizing events as benign, suspicious, or malicious
- Immediate security posture assessment using QSecBit scoring
- User-friendly web dashboard that enables live visualization of threats
- Implementation of post-quantum cryptography standards, specifically Kyber KEM
- A collaborative mesh defense system that enhances security across multiple nodes.
This combination of features ensures that HookProbe delivers a robust, adaptable, and highly autonomous security solution suitable for modern network environments.
API Access
Has API
API Access
Has API
Screenshots View All
No images available
Integrations
AWS Marketplace
Amazon S3
Chronicle
Confluent
CrowdStrike Falcon
Cybraics
Databricks
Elastic Cloud
EndaceProbe
Exabeam
Integrations
AWS Marketplace
Amazon S3
Chronicle
Confluent
CrowdStrike Falcon
Cybraics
Databricks
Elastic Cloud
EndaceProbe
Exabeam
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$9/month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Corelight
Founded
2013
Country
United States
Website
www.corelight.com
Vendor Details
Company Name
HookProbe
Founded
2022
Country
Romania
Website
hookprobe.com
Product Features
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption