Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Zeek Alternatives

Zeek Reviews & Product Details

Zeek Overview

What is Zeek?

Zeek transforms network traffic into compact, high-fidelity transaction logs, allowing defenders to understand activity, detect attacks, and respond to them.

Zeek Details
Discussions
Zeek Community
Show LessShow More
Product Description

Zeek transforms network traffic into compact, high-fidelity transaction logs, allowing defenders to understand activity, detect attacks, and respond to them.


Seller Details
Seller
Corelight
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,217 Twitter followers
LinkedIn® Page
www.linkedin.com
325 employees on LinkedIn®
Description

Corelight is a cybersecurity vendor that specializes in providing advanced network visibility and threat detection solutions. Leveraging open-source technology, particularly Zeek (formerly known as Bro), Corelight offers tools that enable organizations to analyze and respond to security incidents effectively. Their platform helps businesses gain insights into network traffic, detect breaches, and enhance their overall security posture. For more information, visit their website at https://www.corelight.com/.

Recent Zeek Reviews

VM
Vaishnavi M.Mid-Market (51-1000 emp.)
5.0 out of 5
"BEST SECURITY FRAMEWORK"
Zeek is user-friendly software also best part in it is it is a open source software use for network analysis framework it's flexible monitering tool
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Zeek Media

Answer a few questions to help the Zeek community
Have you used Zeek before?
Yes

1 Zeek Reviews

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 Zeek Reviews
5.0 out of 5
1 Zeek Reviews
5.0 out of 5
G2 reviews are authentic and verified.
VM
Associate Cyber security consultant
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Zeek?

Zeek is user-friendly software also best part in it is it is a open source software use for network analysis framework it's flexible monitering tool Review collected by and hosted on G2.com.

What do you dislike about Zeek?

Nothing to dislike there are some bugs use scripting language Review collected by and hosted on G2.com.

What problems is Zeek solving and how is that benefiting you?

Monitor the network traffic

Response on the same

Check out cyber attack comming in network traffic

In dept analysis and then report do security audits Review collected by and hosted on G2.com.

There are not enough reviews of Zeek for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Trend Vision One Logo
Trend Vision One
4.7
(187)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
2
Blumira Automated Detection & Response Logo
Blumira Automated Detection & Response
4.6
(107)
Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.
3
InsightIDR Logo
InsightIDR
4.4
(69)
InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.
4
ExtraHop Logo
ExtraHop
4.6
(67)
ExtraHop Reveal(x) provides cloud-native visibility, detection, and response for the hybrid enterprise.
5
Cortex XDR Logo
Cortex XDR
4.6
(45)
Traditional antivirus (AV) is not the solution to endpoint security – it’s the problem. AV can no longer stop today’s threats. Cortex XDR advanced endpoint protection is the only product offering that replaces AV with “multi-method prevention”: a proprietary combination of malware and exploit prevention methods that pre-emptively block both known and unknown threats
6
B1 Platform by CloudCover Logo
B1 Platform by CloudCover
4.6
(42)
What if your network security could… Respond to every threat in microseconds? Reject unwanted packets with pinpoint accuracy? Reside everywhere on network, including the cloud? So you could Relax. Your network’s safe with us. It’s like having a firewall everywhere™.
7
Cisco Secure Network Analytics Logo
Cisco Secure Network Analytics
4.4
(33)
Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.
8
Darktrace/Detect Logo
Darktrace/Detect
4.4
(27)
The enterprise immune system
9
ManageEngine ADAudit Plus Logo
ManageEngine ADAudit Plus
4.5
(26)
Real-time Windows Active Directory and File-Server change audit solution
10
Flowmon Platform Logo
Flowmon Platform
4.2
(25)
Flowmon Networks provides a solution that helps companies to enhance performance of their networks and secure them against modern cyber threats.
Show More