New Release - Core Network Insight 6.3

June 19, 2017

Here at Core, we are continuously working to improve our products and services and today we are excited to announce the newest release of Core Network Insight 6.3

The new offering includes enhancements like Retroactive Analysis, which allows users to “look back in time” at metadata from before a device started to act suspiciously, and new behavior profilers.

Core Network Insight is an advanced threat detection system built on nearly a decade of scientific research and big data visibility. It automatically and accurately identifies hidden infections in real time on live traffic. When Core Network Insight confirms a device is infected by advanced persistent threats or malware, it terminates criminal communications and presents a full case of evidence, prioritized by risk – thus, no more chasing False Positives. 

“Organizations are constantly looking for better, correlated data to help them conduct more thorough investigations into incidents to protect from data breaches,” said Chris Sullivan, CTO of Core Security. “Our new retroactive analysis capability provides more historic context, helping to speed along these investigations. In addition, the addition of the transaction and contextual profilers continue to make Core Network Insight the most robust solution for detecting the myriad of ways and patterns that criminal operators use once they have penetrated a network.”

New features in Core Network Insight 6.3 include:

  • Enabling Hunting of Network Communication Data:
    • Retroactive Analysis
    • New API Support 
  • Driving Innovation Into Advanced Threat Detection:
    • New Transaction Profiler
    • New Contextual Profiler 
    • DNS Tunneling and TOR Detection
  • New Deployment Options: Virtual Sensor 


See below for a few screenshots from the newest release. For more detailed release information, view our press release here. To learn more about Core Network Insight 6.3 or schedule a demo click here or contact us at

[[{"fid":"3956","view_mode":"default","fields":{"format":"default","field_file_image_alt_text[und][0][value]":"Core Network Insight ","field_file_image_title_text[und][0][value]":false,"alignment":""},"type":"media","field_deltas":{"1":{"format":"default","field_file_image_alt_text[und][0][value]":"Core Network Insight ","field_file_image_title_text[und][0][value]":false}},"link_text":null,"attributes":{"alt":"Core Network Insight ","height":"125","width":"400","class":"media-element file-default","data-delta":"1"}}]]         [[{"fid":"3958","view_mode":"default","fields":{"format":"default","field_file_image_alt_text[und][0][value]":"Core Network Insight","field_file_image_title_text[und][0][value]":false,"alignment":""},"type":"media","field_deltas":{"2":{"format":"default","field_file_image_alt_text[und][0][value]":"Core Network Insight","field_file_image_title_text[und][0][value]":false}},"link_text":null,"attributes":{"alt":"Core Network Insight","height":"180","width":"400","class":"media-element file-default","data-delta":"2"}}]]       [[{"fid":"3960","view_mode":"default","fields":{"format":"default","field_file_image_alt_text[und][0][value]":"Core Network Insight","field_file_image_title_text[und][0][value]":false,"alignment":""},"type":"media","field_deltas":{"3":{"format":"default","field_file_image_alt_text[und][0][value]":"Core Network Insight","field_file_image_title_text[und][0][value]":false}},"link_text":null,"attributes":{"alt":"Core Network Insight","height":"140","width":"400","class":"media-element file-default","data-delta":"3"}}]]

  • Network Insight

Ready for a Demo?

Eliminate identity-related breaches with SecureAuth!