As an incident responder, threat hunter, or detection engineer, getting quickly
to your analytics is key for productivity. For network-based visibility and
detection, Zeek and Suricata are the
bedrock for many security teams. But operationalizing these tools can take a
good chunk of time.
So we asked ourselves: How can we make it super easy to work with Zeek and
Suricata logs?
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 Child Process shell