Trisul Blog

We’re kicking off the New Year 2019 with a couple of Trisul scripts to detect Covert Channels that use PING. This script was inspired by the blog post [How To: C2 over ICMP]

Network flows or conversations are a very important part of network security and traffic analytics. Trisul has always had excellent support for reconstructing, storage, and querying of very large scale flow databases.

We are pleased to make the following announcements. New Ubuntu 18.04 repository ready to install packages

We just released new packages of Trisul which include many features which make many Network Security Monitoring and Traffic Analytics workflows even easier.

The Trisul NSM platform has always provided a way to integrate threat intelligence feeds using the Badfellas Plugin. That works great but it is limited in flexibilty.

New packages of Trisul Network Analytics have now landed on our download page. The features here are carefully selected to put advanced network traffic and security monitoring features into the hands of all enterprises big and small.

We just released a new version of Trisul Network Analytics 6.5. This release features a lot of stability and performance improvements that make it even more attractive to deploy Trisul Network Analytics as your frontline NSM platform (Network Security Monitoring and Traffic Analytics).

We are delighted to announce our latest release “Trisul 6.5”. We think this is our best yet. We have rolled into this lessons learnt from watching users of our previous releases and other tools. Our goal is to make Trisul the go-to tool for full blown NSM and deep network traffic analysis.

We are pleased to announced a new developer resource Trisul Devzone This will be useful for those using the Lua Scripting interface or the Ruby TRP API to automate Network Security Monitoring tasks.

We are excited to announce TrisulNSM Docker This is a new Network Security and Traffic Monitoring (NSM) platform that includes everything you need in a single easy to use docker container.