Cribl puts your IT and Security data at the center of your data management strategy and provides a one-stop shop for analyzing, collecting, processing, and routing it all at any scale. Try the Cribl suite of products and start building your data engine today!
Learn more ›Evolving demands placed on IT and Security teams are driving a new architecture for how observability data is captured, curated, and queried. This new architecture provides flexibility and control while managing the costs of increasing data volumes.
Read white paper ›Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure.
Learn more ›Cribl Edge provides an intelligent, highly scalable edge-based data collection system for logs, metrics, and application data.
Learn more ›Cribl Search turns the traditional search process on its head, allowing users to search data in place without having to collect/store first.
Learn more ›Cribl Lake is a turnkey data lake solution that takes just minutes to get up and running — no data expertise needed. Leverage open formats, unified security with rich access controls, and central access to all IT and security data.
Learn more ›The Cribl.Cloud platform gets you up and running fast without the hassle of running infrastructure.
Learn more ›Cribl.Cloud Solution Brief
The fastest and easiest way to realize the value of an observability ecosystem.
Read Solution Brief ›Cribl Copilot gets your deployments up and running in minutes, not weeks or months.
Learn more ›AppScope gives operators the visibility they need into application behavior, metrics and events with no configuration and no agent required.
Learn more ›Explore Cribl’s Solutions by Use Cases:
Explore Cribl’s Solutions by Integrations:
Explore Cribl’s Solutions by Industry:
Try Your Own Cribl Sandbox
Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Get inspired by how our customers are innovating IT, security and observability. They inspire us daily!
Read Customer Stories ›Sally Beauty Holdings
Sally Beauty Swaps LogStash and Syslog-ng with Cribl.Cloud for a Resilient Security and Observability Pipeline
Read Case Study ›Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Transform data management with Cribl, the Data Engine for IT and Security
Learn More ›Cribl Corporate Overview
Cribl makes open observability a reality, giving you the freedom and flexibility to make choices instead of compromises.
Get the Guide ›Stay up to date on all things Cribl and observability.
Visit the Newsroom ›Cribl’s leadership team has built and launched category-defining products for some of the most innovative companies in the technology sector, and is supported by the world’s most elite investors.
Meet our Leaders ›Join the Cribl herd! The smartest, funniest, most passionate goats you’ll ever meet.
Learn More ›Whether you’re just getting started or scaling up, the Cribl for Startups program gives you the tools and resources your company needs to be successful at every stage.
Learn More ›Want to learn more about Cribl from our sales experts? Send us your contact information and we’ll be in touch.
Talk to an Expert ›Desi Gavis-Hughson leads solutions marketing at Cribl. Prior to joining Cribl, Desi gaine... Read Mored over ten years of experience selling and marketing technology to IT and Ops leaders in commercial real estate, financial services, the media, and the public sector. Desi attended Princeton University, where she majored in East Asian Studies. Read Less
Organizations today face a growing list of obstacles as they try to improve their detection, coverage, and accuracy. For one, data proliferation is happening at an astronomical rate. When was the last time your network bandwidth went down? What about your license costs for data storage or your SIEM?
Difficulties arise from overlapping and poorly integrated tools that generate disparate data streams and several operational efficiencies. If you can’t link to firewall IDs, alerts, endpoints, or other datasets, getting the high-fidelity data necessary to provide context for alerts and quickly do triage is impossible.
An alert-based strategy addresses security threats by identifying and responding to known attack types. It operates on the coverage principle, ensuring the system can recognize and alert security teams to specific, predefined threat patterns.
This method often involves a significant volume of alerts, which requires robust automation to manage and prioritize effectively. An alert-based strategy is also endpoint-centric, concentrating on devices within the network to facilitate immediate and direct incident response actions when an alert is triggered.
Alerts are certainly necessary, but they only capture information about known variables. You can leverage them when responding to an incident, but this approach is reactive. To stay ahead of the threat landscape, enterprises are adding evidence and breadth of coverage from the network.
Organizations can more adequately address modern security data management challenges by layering a more proactive and investigative approach in addition to alerts. An evidence-based strategy involves collecting and analyzing data across the network to identify and disrupt advanced attacks that don’t match known signatures or behaviors.
By gathering comprehensive evidence, you can enhance incident response (IR), analytics, and the automation of security processes. Evidence-based strategies are network-centric, providing a wider lens through which security teams can observe and collect a broad spectrum of evidence. This is crucial to uncovering subtle, sophisticated threats that might otherwise evade detection by standard alert-based systems.
The Log4Shell vulnerability rocked everyone’s world when it came out. The challenge it presented was detection — it was unknown how prevalent the vulnerable class was across different systems and software. Security organizations struggled to see where there were vulnerabilities to ensure that no one was attempting an exploit. Alerting was crucial for detection and remediation in this case.
On the other hand, the SolarWinds attack forced organizations to look back six to nine months, making the case for the importance of evidence. Adversaries leave footprints, so maintaining detailed logs and using effective monitoring tools are essential for uncovering past breaches.
Cribl Stream and Corelight are helping security teams address these increasingly sophisticated security challenges and implement their evidence-based strategies. Corelight specializes in network detection and response, providing detailed network transaction logs and insights derived from network traffic. Cribl’s observability pipeline can ingest, transform, and route that data from Corelight.
When used together, Corelight’s network data feeds into Cribl, where it can be parsed, enriched, and normalized before being sent to analytics tools, SIEMs, or other storage solutions. This combination allows organizations to optimize their security data, control costs by filtering and reducing data volumes, and improve the overall efficiency of their security operations by ensuring that high-fidelity data is available for analysis and response.
All this is accomplished via Cribl Pack — a pre-built bundle of configurations that streamlines the integration and management of data from specific sources. The Corelight Pack is tailored to handle the rich network security data produced by Corelight sensors. It provides out-of-the-box parsing capabilities, meaning the complex network traffic data is immediately structured into a usable format.
The Corelight Pack also offers enrichment functions that can add contextual information to the data, enhancing its value for threat detection and analysis. By leveraging this pack, organizations can ensure that the voluminous data from Corelight is efficiently processed, enabling faster and more accurate security incident response.
The Corelight Pack protects against data proliferation and the inefficiencies of disjointed security tools — offering a cohesive platform that not only enhances the detection of known threats but provides insight into the unknown.
A Corelight customer who was recently targeted by ransomware was able to leverage this deployment to swiftly pinpoint the breach’s entry point, its extent, and the affected areas. They discovered that the compromised data was outdated and that the attacker had not spread to other parts of their network — so they confidently decided against paying the ransom, knowing they could continue operations despite the threat.
By using Cribl and Corelight together, organizations can turn the footprints of adversaries into critical evidence to establish a robust defense and drive decisions that bring the best business outcomes. This combination expands visibility, bolsters detection, and accelerates investigations while maintaining data fidelity.
Watch this full webinar to learn more about how Corelight’s comprehensive security evidence pairs seamlessly with Cribl’s ability to enrich and efficiently route Corelight data to any platform without straining your SIEM or security budget.
Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy. Customers use Cribl’s suite of products to collect, process, route, and analyze all IT and security data, delivering the flexibility, choice, and control required to adapt to their ever-changing needs.
We offer free training, certifications, and a free tier across our products. Our community Slack features Cribl engineers, partners, and customers who can answer your questions as you get started and continue to build and evolve. We also offer a variety of hands-on Sandboxes for those interested in how companies globally leverage our products for their data challenges.
Experience a full version of Cribl Stream and Cribl Edge in the cloud with pre-made sources and destinations.
Classic choice. Sadly, our website is designed for all modern supported browsers like Edge, Chrome, Firefox, and Safari
Got one of those handy?