{"id":227,"date":"2026-01-05T16:46:58","date_gmt":"2026-01-05T15:46:58","guid":{"rendered":"https:\/\/exiteam.fr\/?page_id=227"},"modified":"2026-01-05T16:53:00","modified_gmt":"2026-01-05T15:53:00","slug":"corelight-investigator","status":"publish","type":"page","link":"https:\/\/exiteam.fr\/index.php\/corelight-investigator\/","title":{"rendered":"Corelight Investigator"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><strong>Investigator simplifie et acc\u00e9l\u00e8re la chasse aux menaces et leurs investigations gr\u00e2ce \u00e0 des alertes qualifi\u00e9es et contextuelles ainsi que des outils de requ\u00eatages et des recherches \u00e9volutives.<\/strong><\/p>\n\n\n\n<p><br><strong>Pr\u00e9sentation de la solution<\/strong><br>Investigator est une solution SaaS de type d\u00e9tection d\u2019intrusions et de menaces avanc\u00e9es r\u00e9seaux (NDR : Network Detection and Response) qui combine les donn\u00e9es contextuelles du r\u00e9seau \u00e0 l&rsquo;apprentissage automatique (ML : Machine Learning) et \u00e0 des analyses avanc\u00e9es dans une plateforme de recherche rapide et intuitive qui acc\u00e9l\u00e8re les op\u00e9rations de s\u00e9curit\u00e9 &amp; d\u2019analyse forensique et consolide l\u2019ensembles des outils existants.<\/p>\n\n\n\n<p><strong>Comment cela fonctionne<\/strong><br>Investigator \u00e9tend la puissance des forensiques du r\u00e9seau bas\u00e9e sur la solution Open Source Zeek aux \u00e9quipes SOC partout dans le monde.<br>Comme Investigator est une solution SaaS, les clients peuvent acc\u00e9der \u00e0 leurs donn\u00e9es \u00e0 partir de n&rsquo;importe quel navigateur Web et ing\u00e9rer des forensiques provenant des sondes Corelight. Les clients peuvent d\u00e9ployer les sondes Corelight dans des environnements \u00ab on-premise \u00bb et\/ou dans le Cloud (AWS, GCP, Azure). Les sondes obtiennent une copie du trafic r\u00e9seau via des solutions de type Packet Broker, TAP r\u00e9seaux, Port Mirroring, et dans les environnements Cloud, via des solutions vTAP native ou pas (par exemple, la mise en miroir du trafic VPC dans AWS).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"520\" src=\"https:\/\/exiteam.fr\/wp-content\/uploads\/2026\/01\/investigator-process-1024x520.png\" alt=\"\" class=\"wp-image-229\" srcset=\"https:\/\/exiteam.fr\/wp-content\/uploads\/2026\/01\/investigator-process-1024x520.png 1024w, https:\/\/exiteam.fr\/wp-content\/uploads\/2026\/01\/investigator-process-300x152.png 300w, https:\/\/exiteam.fr\/wp-content\/uploads\/2026\/01\/investigator-process-768x390.png 768w, https:\/\/exiteam.fr\/wp-content\/uploads\/2026\/01\/investigator-process-1536x781.png 1536w, https:\/\/exiteam.fr\/wp-content\/uploads\/2026\/01\/investigator-process.png 1714w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Investigator simplifie et acc\u00e9l\u00e8re la chasse aux menaces et leurs investigations gr\u00e2ce \u00e0 des alertes qualifi\u00e9es et contextuelles ainsi que des outils de requ\u00eatages et des recherches \u00e9volutives. Pr\u00e9sentation de la solutionInvestigator est une solution SaaS de type d\u00e9tection d\u2019intrusions et de menaces avanc\u00e9es r\u00e9seaux (NDR : Network Detection and Response) qui combine les donn\u00e9es [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":236,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-227","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/pages\/227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/comments?post=227"}],"version-history":[{"count":5,"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/pages\/227\/revisions"}],"predecessor-version":[{"id":235,"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/pages\/227\/revisions\/235"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/media\/236"}],"wp:attachment":[{"href":"https:\/\/exiteam.fr\/index.php\/wp-json\/wp\/v2\/media?parent=227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}