Network Security Monitoring

  • Swarm-SecOps – Network Security Monitoring

    We use Zeek as a network security monitor to support investigations of suspicious or malicious activity. Zeek is a passive, open-source network traffic analyzer. Zeek creates an extensive set of logs describing network activity. These logs include not only a comprehensive record of every connection seen on the wire, but also application-layer transcripts. These include […]

    We use Zeek as a network security monitor to support investigations of suspicious or malicious activity. Zeek is a passive, open-source network traffic analyzer. Zeek creates an extensive set of logs describing network activity. These logs include not only a comprehensive record of every connection seen on the wire, but also application-layer transcripts. These include all HTTP sessions with their requested URIs, key headers, MIME types, and server responses; DNS requests with replies; SSL certificates; key content of SMTP sessions; and much more.

    Click here for more about Swarm-Secops

  • ‘It was a thoroughly enjoyable and informative experience. Phil was fantastic throughout the entire day, and I have to say, though usually these kinds of events can be a bit tiresome, this was certainly an exception as it was a much more interesting and fun experience and was delivered brilliantly. (+ quite the interesting setting!)

    I have certainly gained many key points that I believe I can take away and begin looking  into applying to my own organisation, and the ones we support.’

    Brecon Smith,
    Assured Digital