What Integrates with Corelight?

Find out what Corelight integrations exist in 2024. Learn what software and services currently integrate with Corelight, and sort them by reviews, cost, features, and more. Below is a list of products that Corelight currently integrates with:

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    54,300 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 2
    Amazon S3 Reviews
    Amazon Simple Storage Service (Amazon S3), an object storage service, offers industry-leading scalability and data availability, security, performance, and scalability. Customers of all sizes and industries can use Amazon S3 to store and protect any amount data for a variety of purposes, including data lakes, websites and mobile applications, backup, restore, archive, enterprise apps, big data analytics, and IoT devices. Amazon S3 offers easy-to-use management tools that allow you to organize your data and set up access controls that are tailored to your business, organizational, or compliance needs. Amazon S3 is built for 99.999999999% (11 9,'s) of durability and stores data for millions applications for companies around the globe. You can scale your storage resources to meet changing demands without having to invest upfront or go through resource procurement cycles. Amazon S3 is designed to last 99.999999999% (11 9,'s) of data endurance.
  • 3
    Sumo Logic Reviews

    Sumo Logic

    Sumo Logic

    $270.00 per month
    2 Ratings
    Sumo Logic is a cloud-based solution for log management and monitoring for IT and security departments of all sizes. Integrated logs, metrics, and traces allow for faster troubleshooting. One platform. Multiple uses. You can increase your troubleshooting efficiency. Sumo Logic can help you reduce downtime, move from reactive to proactive monitoring, and use cloud-based modern analytics powered with machine learning to improve your troubleshooting. Sumo Logic Security Analytics allows you to quickly detect Indicators of Compromise, accelerate investigation, and ensure compliance. Sumo Logic's real time analytics platform allows you to make data-driven business decisions. You can also predict and analyze customer behavior. Sumo Logic's platform allows you to make data-driven business decisions and reduce the time it takes to investigate operational and security issues, so you have more time for other important activities.
  • 4
    Splunk Cloud Reviews
    Splunk is a secure, reliable, and scalable service that turns data into answers. Our Splunk experts will manage your IT backend so you can concentrate on your data. Splunk's cloud-based data analytics platform is fully managed and provisioned by Splunk. In as little as two days, you can go live. Software upgrades can be managed to ensure that you have the most recent functionality. With fewer requirements, you can tap into the data's value in days. Splunk Cloud is compliant with FedRAMP security standards and assists U.S. federal agencies, their partners, and them in making confident decisions and taking decisive actions at rapid speed. Splunk's mobile apps and augmented reality, as well as natural language capabilities, can help you increase productivity and contextual insight. Splunk solutions can be extended to any location by simply typing a phrase or tapping a finger. Splunk Cloud is designed to scale, from infrastructure management to data compliance.
  • 5
    Databricks Lakehouse Reviews

    Databricks Lakehouse

    Databricks

    $99.00/month
    All your data, analytics, and AI in one unified platform. Databricks is powered by Delta Lake. It combines the best data warehouses with data lakes to create a lakehouse architecture that allows you to collaborate on all your data, analytics, and AI workloads. We are the original developers of Apache Spark™, Delta Lake, and MLflow. We believe open source software is the key to the future of data and AI. Your business can be built on an open, cloud-agnostic platform. Databricks supports customers all over the world on AWS, Microsoft Azure, or Alibaba cloud. Our platform integrates tightly with the cloud providers' security, compute storage, analytics and AI services to help you unify your data and AI workloads.
  • 6
    cPacket Reviews

    cPacket

    cPacket Networks

    cVu-V - $21,000/year
    cPacket provides network-aware application performance for distributed hybrid-IT environments and security assurance. Our single-pane of-glass analytics enable machine learning-based AIOps. cPacket allows you to manage, secure, and future-proof your network, enabling digital transformation. This industry's most comprehensive, yet simple network visibility stack offers all you need to manage your hybrid network across branch and data center, as well as the cloud.
  • 7
    Elastic Cloud Reviews

    Elastic Cloud

    Elastic

    $16 per month
    Search, observability, security, and enterprise search for the cloud. Whether you use Amazon Web Services, Google Cloud or Microsoft Azure, you can quickly and easily find the information you need, gain insights, protect your investment in technology, and do so with ease. We take care of the maintenance so that you can concentrate on the things that matter to you. It's easy to configure and deploy. You can scale easily, use custom plugins and optimize your architecture for log and time series data. You can get the full Elastic experience, including machine learning, Canvas and APM, index lifecycle management as well as Elastic App Search and Elastic Workplace Search. Logging and metrics are only the beginning. To address security, observability and other critical use cases, you can bring together your diverse data.
  • 8
    CrowdStrike Falcon Reviews
    The Falcon Platform is flexible, extensible, and adaptable when it comes to your endpoint security requirements. You can choose from the bundles listed above or any of these modules. Additional modules can be added to Falcon Endpoint Protection packages. Individual modules can be purchased without the need for a Falcon Endpoint Protection bundle. Customers who have more stringent compliance requirements or operational requirements will find our specialized products useful.
  • 9
    Exabeam Reviews
    From the CISO to the analyst, Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools. Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes, and hundreds of other business and security products.
  • 10
    Humio Reviews
    Log everything and answer any question in real-time. Modern log management with streaming observation and affordable Unlimited Plans. Humio is designed to consume and retain streaming data at the speed it arrives, regardless how large or small. Alerts, scripts and dashboards are always up-to-date. Live tail and retained data searches take almost no time. Humio is completely index-free and can work with any type of structured or unstructured data. Because you don’t need to define fields beforehand, you can ask any question using live or archived data and get a lightning-fast response. Humio offers industry-leading Unlimited Plans and affordable licenses. Its advanced compression and bucket storage can save up to 70% on storage and compute costs. Humio is easy to deploy and requires very little maintenance. Humio can ingest unlimited data at any throughput in order to provide the full data set required to detect and respond.
  • 11
    Gigamon Reviews
    Your Digital Transformation Journey will be fueled. With unparalleled intelligence and depth, manage complex digital apps across your network. It can be difficult to manage your network daily to ensure availability. Networks are becoming faster, data volumes are increasing, and users and apps are everywhere. This makes managing and monitoring your network difficult. How can you drive Digital Transformation? Imagine if you could guarantee network uptime and gain visibility into your data in motion across physical, virtual, and cloud environments. Get visibility across all networks, applications, tiers, and tiers -- and intelligence across complex applications structures. Gigamon solutions can dramatically improve the effectiveness of your entire network ecosystem. Are you ready to find out how?
  • 12
    Confluent Reviews
    Apache Kafka®, with Confluent, has an infinite retention. Be infrastructure-enabled, not infrastructure-restricted Legacy technologies require you to choose between being real-time or highly-scalable. Event streaming allows you to innovate and win by being both highly-scalable and real-time. Ever wonder how your rideshare app analyses massive amounts of data from multiple sources in order to calculate real-time ETA. Wondering how your credit card company analyzes credit card transactions from all over the world and sends fraud notifications in real time? Event streaming is the answer. Microservices are the future. A persistent bridge to the cloud can enable your hybrid strategy. Break down silos to demonstrate compliance. Gain real-time, persistent event transport. There are many other options.
  • 13
    Trellix Malware Analysis Reviews
    Malware analysis is an important part in preventing and detecting future attacks. Cyber security experts can use malware analysis tools to analyze the attack lifecycle and extract important forensic details that will enhance their threat intelligence. The AX series products for malware analysis provide a secure environment in which to test, replay and characterize advanced malicious activities. Malware Analysis shows the entire cyber attack lifecycle, starting with the initial exploit and malware execution path and ending at callback destinations and subsequent binary download attempts. This information will help you to plan future prevention strategies. Stop attacks spreading using auto-generated local attack profile, which can be instantly shared throughout the Trellix ecosystem. A simple interface allows you to load suspicious files and file sets.
  • 14
    Cybraics Reviews
    The world's most advanced XDR platform revolutionizes threat detection, log management and response. Our silo-breaking, industry-leading XDR platform is an enterprise-class platform that simplifies security operations and covers compliance. Cybraics™ is more than a security tool. It was born out of AI and machine-learning research with the U.S. Department of Defense. It's the catalyst for unlocking actionable intelligence from scattered and siloed logs, alerts and data across multiple security tools in the network. Cybraics is a powerful threat detection tool that doesn't have to be expensive. Powered by Persistent Behavior Tracing and Adaptive Analytic Detection. Maximize security team efficiency with 96% automated case creation and a 95% decrease in false positives. Reduce response time and detection time from months to minutes.
  • 15
    ReversingLabs Titanium Platform Reviews
    Advanced malware analysis platform that detects malicious files faster through automated static analysis. It can be used in any cloud and any environment. More than 360 file formats were processed and 3600 file types were identified from various platforms, applications and malware families. Real-time, deep inspection and analysis of files. This can be scaled to 150 million files per hour without dynamic execution. Connectors that are tightly coupled integrate industry-leading email, SIEM and SOAR platforms, as well as EDR, SIEM and SIEM. Unique Automated Static Analysis completely dissects the internal contents of files in just 5 ms, without execution, which eliminates the need for dynamic analysis in most instances.
  • 16
    Splunk Phantom Reviews
    Security automation, security orchestration and response can help you harness the power of your security investments. Splunk Phantom makes it easy to execute actions in seconds, not hours. Automate repetitive tasks to increase your team's effort and allow you to focus on mission-critical decisions. Automated investigations can reduce dwell time. Automated investigations reduce response times. Playbooks that run at machine speed can reduce response time. Integrate your security infrastructure so that each component is actively participating in your defense strategy. Phantom's flexible app structure supports hundreds of tools as well as thousands of APIs. This allows you to connect and coordinate complex workflows between your team and tools. The platform's powerful abstraction allows you to concentrate on what you want to do, while the platform converts that into specific actions for each tool. Phantom allows you to work smarter through a series actions, from detonating files and quarantining devices.
  • 17
    Devo Reviews

    Devo

    Devo Technology

    WHY DEVO Devo Data Analytics Platform. Get full visibility through cloud-scale, central log management. Say goodbye to compromises and constraints. The new generation of log management, analytics and data management will power operations teams. Machine data is required to improve visibility, transform SOC and achieve enterprise-wide business goals. You need to keep up with the ever-increasing data volumes while not breaking the bank. No ninjas needed. Re-architecting is dead. Devo grows with you, exceeding even the most demanding requirements without you having to manage clusters or indexes or be restricted by unreasonable limits. In a matter of minutes, you can easily add massive new datasets. Easily grant access to hundreds of new users. Your teams' needs will be met year after year, petabyte after petabyte. SaaS that is agile and cloud-native Lift-and-shift cloud architectures just don't cut it. They all suffer the same performance
  • 18
    ThreatQ Reviews

    ThreatQ

    ThreatQuotient

    Threat intelligence platform - threatQ, to understand and prevent threats more effectively and efficiently, your security infrastructure and people must work smarter, and not harder. ThreatQ is an extensible and open threat intelligence platform that can accelerate security operations through simplified threat operations and management. The integrated, self-tuning, adaptive threat library, open exchange, and workbench allow you to quickly understand threats and make better decisions, thereby accelerating detection and response. Based on your parameters, automatically score and prioritize internal or external threat intelligence. Automate the aggregation and operationalization of threat intelligence across all systems. Integrating your tools, teams, and workflows will increase the effectiveness of your existing infrastructure. All teams have access to a single platform that enables threat intelligence sharing, analysis, and investigation.
  • 19
    Proofpoint Emerging Threat (ET) Intelligence Reviews
    Proofpoint ET Intelligence provides the most accurate and timely threat intelligence. Our fully verified intelligence provides more context and seamlessly integrates with your security tools to improve your decision-making. It is not enough to know what threats exist to protect your people, data, or brand. Emerging Threat Intelligence (ETI) helps you to prevent attacks and reduce risk. It allows you to understand the historical context of these threats, who they are behind, when they attacked, what their methods were, and what they are after. Access on-demand historical and current metadata on IPs, domains and other threat intelligence to assist in investigating incidents and researching threats. You also get reputation intel, condemnation evidence, deep context and history, as well as detection information. All this information is searchable in an easy to use threat intelligence portal. It includes: Trends and timestamps for when a threat was identified and the associated category.
  • 20
    Forcepoint Behavioral Analytics Reviews
    Visibility, analytics and automated control all converge into one solution. Security analysts can eliminate complexity with UEBA's automated policy enforcement, comprehensive user risk scoring, and simplified security. Combining DLP and behavioral analytics gives you a 360-degree view of user actions and intent across the enterprise. Use out-of-the box analytics to create risk models that meet your organization's specific needs. An at-a glance view of users ranked according to risk allows you to quickly identify risk trends within your organization. For a complete view of all users interfacing across the enterprise, leverage your entire IT ecosystem including chat data and unstructured data sources. Deep context driven by machine learning and big data analytics allows you to understand user intent. Unlike traditional UEBA, insights can be used to prevent loss and take action. Fast detection and mitigation will help you protect your people and data from insider threats.
  • 21
    EndaceProbe Reviews
    EndaceProbes records 100% accurate Network History to resolve Cybersecurity, Network, and Application problems. An open packet capture platform provides clarity to any incident, alert, or issue. It integrates with all commercial, open-source, or custom-built tools. You can see exactly what's going on in the network to help you investigate and defend against the most serious Security Threats. You can quickly fix Network and Application Performance issues by capturing vital network evidence. The EndaceProbe Platform is an open platform that brings together tools, teams, and workflows into an integrated Ecosystem. All your tools have access to network history. Built into existing workflows, so teams don’t need to learn new tools. You can easily deploy your favorite security and monitoring tools on this powerful platform. You can quickly search and retrieve a network history that spans your entire network for weeks or months.
  • 22
    Palo Alto Networks DNS Security Service Reviews
    Palo Alto Networks DNS Security Service is a cloud-based analytics platform that provides your firewall access to DNS signatures generated by advanced predictive analysis and machinelearning. It also includes malicious domain data from a growing threat information sharing community. The DNS Security subscription service will increase your protection against DNS threats. DNS Security now offers individually configurable and extensible DNS Security Signature Categories. This allows you to create separate security policies based upon the risk factors associated certain types of DNS traffic. DNS Security now protects against additional DNS-based threats such as those that rely upon dynamic DNS hosted domains and recently registered domains.
  • 23
    Chronicle Reviews

    Chronicle

    Chronicle Technologies

    $59 per user per month
    Business management software should be both powerful and affordable, according to us. Both powerful and easily accessible. Profit operations of any size. Chronicle sets the standard for excellence by providing unique marketing, financial, and production tools that increase your profitability and efficiency. All at a price that you can afford. Chronicle's sales tools and marketing tools allow you to manage all your contacts and deals without having to keep track of spreadsheets or messy notes. Our mobile apps can be used to sign contracts, track expenses, take notes, and have conversations with leads. The results are then analyzed and shown to you how effective your efforts were.
  • Previous
  • You're on page 1
  • Next