(MENAFN- PR Newswire)
Integration Improves Visibility, Enhances Threat Detection, and Drives Security Tool Consolidation
SAN FRANCISCO, Dec. 11, 2024 /PRNewswire/ --
Corelight , the fastest growing provider of Network detection and response (NDR) solutions, delivers static file analysis capabilities powered by YARA integration, an open-source tool used to scan files and data streams for patterns associated with malware. With YARA rules now available in Corelight sensors, security teams are able to add static file analysis as a critical element of their network monitoring capabilities. Integrating YARA rules into Corelight Open NDR increases the overall efficiency of the security operations center (SOC) by eliminating the need for manual processes or additional tools to extract and analyze files, detect
malware, and create an alert when malware is detected.
Malicious files continue to be a pervasive threat vector across enterprise networks with more than 6 billion
malware attacks in 2023.1 Furthermore, an increasingly complicated stack of standalone security tools creates additional challenges for security teams trying to stay ahead of the influx of threats. This integration provides a deeper level of inspection to detect emerging threats and helps security teams rationalize and consolidate their toolset in the process.
"Corelight accelerates SOC workflows and enables the deepest levels of network detection to accelerate incident response activity and deliver efficiency," said Vijit Nair, vice president of product, Corelight. "We continue our tradition of integrating industry-leading open source capabilities like YARA and Suricata to complement Corelight's foundational technology based on Zeek, providing the most comprehensive evidence for teams to utilize within their operations."
With this integration, security teams using
Corelight can now deploy YARA rules for pattern-based detection to quickly analyze large volumes of files to aid malware identification, proactive threat hunting via indicators of compromise (IOCs), and automated malware analysis. According to Gartner® report "Emerging Tech: Top Use Cases in Preemptive Cyber Defense," "Prevention, faster detection and deeper forensics improve security ops and reduce
mean time to respond (MTTR). Preemptive tech cuts investigation time by 65%, offering instant forensic data for swift action."2 Detections from YARA rules for identifying suspicious, malicious content or latent content or binary artifacts in files are an example of a method used in the predictive threat intelligence use case.
Corelight's integration of YARA rules helps security teams to:
Close Visibility Gaps : Static file analysis with YARA rules provides file inspection at the network layer, closing a gap on devices where endpoint technology isn't deployed.
Facilitate Proactive Threat Hunting : By leveraging static analysis, security teams can proactively identify potential threats before they execute, enabling a more proactive approach to threat hunting and incident response.
Create Customized Rules : YARA rules can be customized to fit specific organizational needs, allowing for tailored threat detection based on unique threat landscapes and security requirements.
Improve Incident Response : Quick identification of malicious files through static analysis streamlines the incident response process, enabling faster remediation and reducing potential damage from attacks.
To learn more about how Corelight and YARA are improving SOC efficiency, please visit .
About
Corelight
Corelight transforms network and cloud activity into evidence that security teams use to proactively hunt for threats, accelerate response to incidents, gain complete network visibility and create powerful analytics. Corelight's global customers include Fortune 500 companies, major government agencies, and large universities. Based in San Francisco, Corelight is an open-core security company founded by
the creators of Zeek , the widely-used network security technology. For more information, visit or follow @corelight_inc .
Footnotes:
SonicWall 2024 Mid-Year Threat Report
Gartner, Emerging Tech: Top Use Cases in Preemptive Cyber Defense, By Lawrence Pingree, Carl Manion, Luis Castillo, Isy Bangurah, Walker Black, John Collins, 13 August 2024
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its
affiliates in the U.S. and internationally and is used herein with permission. All rights
reserved.
SOURCE Corelight, Inc.
WANT YOUR COMPANY'S NEWS FEATURED ON PRNEWSWIRE?
440k+
Newsrooms &
Influencers
9k+
Digital Media
Outlets
270k+
Journalists
Opted In
GET STARTED
MENAFN11122024003732001241ID1108981100
Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.