Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed

Corelight Features

What are the features of Corelight?

Analysis

  • Network Visibility

Filter for Features

Response

Resolution Automation

Diagnose and resolve incidents without the need for human interaction.

Not enough data

Resolution Guidance

Guide users through the resolution process and give specific instructions to remedy individual occurrences.

Not enough data

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

Not enough data

Threat Intelligence

Gathers information related to threats in order to gain further information on remedies.

Not enough data

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Response Orchestration

Integrates additional security tools to automate security and incident response processes.

Not enough data

Response Automation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly

Not enough data

Records

Incident Logs

Information on each incident is stored in databases for user reference and analytics.

Not enough data

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data

Resource Usage

Analyzes recurring incidents and remedies to ensure optimal resource usage.

Not enough data

Management

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Database Management

Adminstrators can access and organize data related to incidents to produce reports or make data more navigable.

Not enough data

Workflow Management

Administrators can organize workflows to guide remedies to specific situations incident types.

Not enough data

Performance Baseline

Sets a standard performance baseline by which to compare live network activity.

Not enough data

Data Visualization

Charts or graphs live and historical network performance for quick status checking and analysis.

Not enough data

Path Analysis

Gives insights into which specific network paths are performing suboptimally.

Not enough data

Network Management

Activity Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

Not enough data

Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

Not enough data

Log Management

Provides security information and stores the data in a secure repository for reference.

Not enough data

Incident Management

Event Management

Alerts users of incidents and allows users to intervene manually or triggers an automated response.

Not enough data

Automated Response

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Incident Reporting

Documents cases of abnormal activity and compromised systems.

Not enough data

Incident Logs

Information on each incident is stored in databases for user reference and analytics.

Not enough data

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Incident Reporting

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data

Security Intelligence

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

Not enough data

Vulnerability Assessment

Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.

Not enough data

Advanced Analytics

Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.

Not enough data

Data Examination

Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.

Not enough data

Administration

Risk Scoring

Provides risk scoring for suspicious activity, vulnerabilities, and other threats.

Not enough data

Secrets Management

Provides tools for managing authentication credentials such as keys and passwords.

Not enough data

Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

Not enough data

Configuration Management

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Not enough data

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Administration Console -

Provides a centralized console for administation tasks and unified control.

Not enough data

API / integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Security Automation

Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.

Not enough data

Security Integration

Integrates additional security tools to automate security and incident response processes.

Not enough data

Multicloud Visibility

Allows users to track and control activity across cloud services and providers.

Not enough data

Monitoring

Continuous Image Assurance

Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats.

Not enough data

Behavior Monitoring

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.

Not enough data

Observability

Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.

Not enough data

Protection

Dynamic Image Scanning

Scans application and image source code for security flaws without executing it in a live environment

Not enough data

Runtime Protection

Monitors container activities and detects threats across containers, networks, and cloud service providers.

Not enough data

Workload Protection

Protects compute resources across a networks and cloud service providers. Serves as Firewall and prompts additional authentication for suspicious users.

Not enough data

Network Segmentation

Allows administrative control over network components, mapping, and segmentation.

Not enough data

Detection

Intrusion Detection

Detects unauthorized access and use of privileged systems.

Not enough data

Security Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Anti-Malware / Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Multi-Network Monitoring

Provides monitoring capabilities for multiple networks at once.

Not enough data

Asset Discovery

Detect new assets as they enter a network and add them to asset inventory.

Not enough data

Anomaly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns

Not enough data

Functionality

Performance Monitoring

Continuously monitors network performance across the entire span of a network.

Not enough data

Alerting

Sends alerts via pop-up notifications, texts, emails, or calls regarding network issues or failures.

Not enough data

Improvement Suggestions

Suggests potential remedies or improvements to slowdowns, errors, or failures.

Not enough data

Multi-Network Capability

Provides monitoring capabilities for multiple networks at once.

Not enough data

Multi-Network Capability

Provides monitoring capabilities for multiple networks at once.

Not enough data

Anomaly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Network Visibility

Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.

Not enough data

Scalability

Provides features to allow scaling for large organizations.

Not enough data

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Anomaly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Continuous Analysis

Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Decryption

Facilitates the decryption of files and data stored using cryptographic algorithms.

Not enough data

Automation

Metadata Management

Indexes metadata descriptions for easier searching and enhanced insights

Not enough data

Artificial Intelligence & Machine Learning

Facilitates Artificial Intelligence (AI) or Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.

Not enough data

Response Automation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Continuous Analysis

Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Analysis

File Analysis

Identifies potentially malicious files and applications for threats files and applications for abnormalities and threats.

Not enough data

Memory Analysis

Analyzes infortmation from a computer or other endpoint's memory dump for information removed from hard drive.

Not enough data

Registry Analysis

Identifies recently accessed files and applications for abnormalities and threats.

Not enough data

Email Analysis

Parses and/or extracts emails and associated content for malware, phishing, other data that can be used in investigations.

Not enough data

Linux Analysis

Allows for parsing and/or extraction of artifacts native to Linux OS including but not limited to system logs, SSH activity, and user accounts.

Not enough data

Incident Reporting

Produces reports detailing trends and vulnerabilities related to their network and infrastructur

Not enough data

Network Visibility

As reported in 10 Corelight reviews. Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
92%
(Based on 10 reviews)

Metadata Enrichment

Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.

Not enough data

Metadata Management

Indexes metadata descriptions for easier searching and enhanced insight

Not enough data

Remediation

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data

Remediation Suggestions

Provides relevant and helpful suggestions for vulnerability remediation upon detection.

Not enough data

Response Automation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Activity Monitoring

Usage Monitoring

Tracks infrastructure resource needs and alerts administrators or automatically scales usage to minimize waste.

Not enough data

Database Monitoring

Monitors performance and statistics related to memory, caches and connections.

Not enough data

API Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Activity Monitoring

Actively monitors status of work stations either on-premise or remote.

Not enough data

Security

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse.

Not enough data

Risk AnalysisView full feature definition

See feature definition
Identifies potential network security risks, vulnerabilities, and compliance impacts.

Not enough data

Reporting

Creates reports outlining log activity and relevant metrics.

Not enough data

Connected Device Security

Vulnerability Assessment

Performs risk and security gap assessments for connected assets.

Not enough data

Identity Lifecycle

Assists with authentication and authorization of connected assets.

Not enough data

Threat Protection

Provides general protection against device threats, such as firewall and antivirus tools.

Not enough data

Behavior Analysis

Monitors device behaviors to identify abnormal events.

Not enough data

Incident Response

Responds to suspicious activity related to IoT devices. This may include actions such as threat containment and eradication as well as device recovery.

Not enough data

IoT Network Security

Provides security measures for IoT networks and gateways.

Not enough data

OTA Updates

Automatically sends over-the-air (OTA) security updates to connected devices.

Not enough data

Alerts & Notifications

Sends timely security notifications to users in-app or through email, text message or otherwise.

Not enough data

Platform

Dashboard

Has a centralized dashboard for users to interact with.

Not enough data

Hardware

Integrates with existing IoT hardware.

Not enough data

Performance

Is consistently available (uptime) and allows users to complete tasks reliably.

Not enough data

Reporting

Provides pre-built or customizable performance reports.

Not enough data