Skip to main content
TrustRadius
Zeek Network Security Monitor

Zeek Network Security Monitor
Formerly Bro

Overview

What is Zeek Network Security Monitor?

The Zeek Network Security Monitor is an open-source tool designed for comprehensive network security monitoring. According to the vendor, it enables organizations of various sizes, from small businesses to large enterprises, to analyze network traffic and detect potential security threats. Zeek is utilized...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Intrusion Detection Systems

Be the first one in your network to review Zeek Network Security Monitor, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Zeek Network Security Monitor?

Zeek (formerly Bro) is a platform for network security monitoring that is available free and open-source.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

7 people also want pricing

Alternatives Pricing

What is AlienVault USM?

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments,…

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no…

Return to navigation

Product Details

What is Zeek Network Security Monitor?

The Zeek Network Security Monitor is an open-source tool designed for comprehensive network security monitoring. According to the vendor, it enables organizations of various sizes, from small businesses to large enterprises, to analyze network traffic and detect potential security threats. Zeek is utilized by a wide range of professionals and industries, including security analysts, network administrators, incident responders, threat hunters, and security operations center (SOC) teams.

Key Features

Real-time Network Traffic Monitoring: According to the vendor, Zeek passively observes network traffic in real-time, providing continuous monitoring to detect and analyze potential security threats. It captures and interprets network traffic to generate detailed logs and transaction records.

Flexible and Customizable Framework: Zeek offers a flexible framework that, according to the vendor, allows users to customize and extend its functionality. Users can create their own scripts and plugins to enhance Zeek's capabilities and tailor it to their specific needs. The framework supports the development of custom analyzers and protocols for in-depth network analysis.

Comprehensive Network Protocol Analysis: Zeek supports the analysis of various network protocols, including TCP, UDP, DNS, HTTP, FTP, and more. According to the vendor, it can decode and analyze network protocols to extract valuable information from network traffic. Zeek provides protocol-specific analyzers for deep inspection and analysis of network communication.

Threat Detection and Intrusion Detection: Zeek includes a set of built-in analyzers and detection scripts for identifying potential security threats. According to the vendor, it can detect and alert on various types of network-based attacks, such as port scans, malware infections, and suspicious behavior. Zeek's detection capabilities aim to help organizations identify and respond to security incidents in a timely manner.

Traffic Analysis and Forensics: Zeek generates detailed logs and transaction records that provide a source of information for traffic analysis and forensics. It captures network traffic data, including packet payloads, connection metadata, and file transfers, for further analysis. According to the vendor, Zeek's log files enable analysts to investigate network incidents, perform post-incident forensics, and gain insights into network activity.

Integration with SIEM and Security Tools: Zeek's output can be easily integrated with security information and event management (SIEM) systems. It can generate logs in various formats, such as JSON or CSV, which can be ingested by SIEM solutions for centralized analysis and correlation. According to the vendor, Zeek's compatibility with other security tools and platforms allows for seamless integration into existing security infrastructures.

Network Performance Monitoring: Zeek provides insights into network performance by monitoring network traffic patterns and statistics. It tracks network events, such as bandwidth usage, packet loss, latency, and throughput, to identify performance issues. According to the vendor, Zeek's performance monitoring capabilities aim to help organizations optimize their network infrastructure and ensure efficient network operations.

Zeek Network Security Monitor Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation