Bricata employs a network behavior engine, customizable using Bro Script, allowing identification of network anomalies.

Bricata is a network cybersecurity solution supplier helping organizations harness the power of complete network visibility to detect, hunt, and prevent threats with the only commercialized open source and partner developed malware conviction engine.

Conventional IDS/IPS systems have lacked the innovation needed to address advanced threats, evidenced by the wide-scale adoption of Open Source solutions. Bro and Suricata are two of the leading engines many teams are using to create tools; but like most open source technologies, they can be difficult to build, deploy, and maintain in-house without the right expertise.

Bricata is closing the gap by delivering the first network security sensors with integrated Bro and Suricata engines. We simplify operations and maintenance with a middleware layer and central management console that makes signature, script, and policy management much easier, and delivers enterprise scalability with enhanced usability and performance.

Built on the advanced open source IPS engines Bro and Suricata, Bricata is a cost-effective, commercial-grade system optimized for multi-location and high bandwidth deployments.


ABOUT BRO: While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber infrastructure. Bro’s user community includes major universities, research labs, super computing centers, and open-science communities.

Miss us at BroCon 2017?


No worries. We’ve got everything you need to get caught up.

Our own Adam Pumphrey presented A Bro Primer, which aimed to help those new to Bro get more familiar with its core concepts and gain a better understanding of the various ways it can be used. It is easy to recognize the forensic and network defense value Bro’s network traffic logs provide, but learning the programming language can seem like a daunting task. Unfortunately, a sound understanding of the Bro programming language and how it can be used to interact with captured network traffic is necessary to begin to realize Bro’s full potential.

From the Blog


How Bro IDS can Help Security Capture Institutional Knowledge for Cyber Alert Enrichment and Better Network Traffic Analysis [#BroCon Session]

September 25, 2018

A presentation at BroCon will demonstrate how Bro IDS can be used to capture institutional knowledge among security analysts while also providing better network traffic analysis and preparing for machine learning applications of the future....

Read More

Fileless Attacks Reinforce the Need for Multiple Methods of Detection [infographic]

Fileless attacks evade traditional signature detection methods because these are launched from memory. A Poneman study shows fileless attacks are becoming more prominent and successful part of cyber attacks....

Read More

Too Many Tools? How Many Tools does the SOC Have?

Studies show the security operations center (SOC) may have anywhere from 10 to 100 cybersecurity tools. The real problem, however, isn’t the number of tools, but the lack of integration....

Read More
Bricata Delivers New Network Security Options for the Cloud
Threat Hunting Platform Available on AWS, Supports VMWare and Linux KVM; Provides Greater Visibility Across Hybrid Cloud and On-Premises Environments
+ +