Security Insights
Security add-on with packet-level analysis at the network edge for fast and actionable security intelligence
Key Takeaways
- Security Insights is an add-on to BlueCat LiveWire, surfaced through LiveNX, that provides packet-level security analytics at the network edge using existing flow and packet data.
- The solution correlates multi-telemetry inputs—NetFlow, IPFIX, sFlow, and Cisco logging—with edge packet capture to deliver unified visibility across LAN, WAN, SD-WAN, data center, and cloud environments.
- By performing analytics locally instead of exporting large packet datasets to the cloud, Security Insights reduces latency, cost, and compliance risk associated with traditional centralized NDR architectures.
- Detections are mapped to OWASP and MITRE ATT&CK frameworks and integrate with SIEM, SOAR, and XDR platforms, enabling coordinated detection, investigation, and automated response workflows.
- Use cases include early detection of encrypted C2 channels on non-standard ports, proactive threat hunting based on threat intel IOCs, and forensic investigation of anomalous TLS certificate usage.
- Security Insights shortens investigation times from hours to minutes by allowing teams to pivot directly from high-level flow anomalies to full packet payloads for forensic-grade analysis.
Challenge
Many enterprises operate with fragmented visibility between network and security teams. Furthermore, traditional network detection and response (NDR) solutions are complex, costly, and siloed, leaving blind spots that attackers can exploit.
Solution
Security Insights, an add-on to BlueCat LiveWire accessible through BlueCat LiveNX, delivers faster detection, forensic investigation, and proactive threat hunting. It quickly transforms existing network-edge data into actionable, scalable security intelligence without the blind spots of traditional NDR.
Benefits
- Detect anomalies and respond in minutes, not hours
- Maximize ROI by leveraging existing raw flow data and packet captures
- Reduce complexity with unified visibility across network and security operations
Transforming network visibility into actionable security intelligence
Cyber adversaries don’t confine themselves to one domain—they move laterally across endpoints, servers, networks, cloud environments, and data centers. Yet, most enterprises still operate with fragmented visibility: the network team sees one slice, the security team sees another, and blind spots remain. This is precisely where attackers thrive.
Enterprises rely on security information and event management (SIEM), security orchestration, automation, and response (SOAR), and extended detection and response (XDR) solutions to secure networks. However, traditional network detection and response (NDR) tools that ingest massive volumes of packet data into centralized cloud-based systems for analysis are often too data-transfer-intensive, expensive, and slow.
At the same time, packet and flow data provide a rich source of security insight. Too often, however, organizations limit this data to performance monitoring, leaving its full forensic and detection potential untapped. Harnessing and analyzing packet and flow telemetry directly at the edge of the network closes visibility gaps, accelerates detection, and avoids the overhead of traditional NDR.
This solution brief explores how Security Insights, an add-on to LiveWire—BlueCat’s network packet capture and forensics solution—and accessible through LiveNX—BlueCat’s network observability platform—provides network and security teams with actionable, scalable security intelligence without blind spots. This brief explains how Security Insights works and offers specific use-case examples of attack detection scenarios. It also highlights key differentiators from legacy NDR solutions and outlines primary benefits.
Solution overview
Security Insights is a modern alternative to NDR. Where traditional tools are costly, complex, and blind to critical traffic, Security Insights delivers real-time detection of anomalies and suspicious behavior with packet-level analysis that extends to the network’s edge.
Analyzing LiveNX and LiveWire flow and packet data without unnecessary data movement to the cloud enables security teams to get actionable intelligence faster. Findings integrate seamlessly into SIEM, SOAR, and XDR platforms, resulting in scalable protection, reduced risk, and improved resiliency without the inefficiencies of NDR.
Whether deployed on a single site or across a global enterprise, Security Insights provides a consistent, scalable foundation for hybrid network defense by acting as an intelligence layer between the network and your security operations stack.

Figure 1. Security Insights architecture
How it works
As a LiveWire add-on accessible through the LiveNX UI, Security Insights operates natively in existing LiveNX and LiveWire environments, transforming network observability into actionable security intelligence. Using the same data that powers performance monitoring, it enables practical network detection without adding tools or complexity. By leveraging flow telemetry from LiveNX and packet-level analysis from LiveWire, Security Insights correlates these findings across all environments—LAN, WAN, SD-WAN, data center, and cloud—giving teams complete visibility into where and how threats emerge.
LiveWire provides deep forensic visibility by performing packet-level capture and analysis at the network edge. It not only captures payloads—including both encrypted and cleartext—but also identifies patterns and reconstructs sessions. This process of capture and analysis is called LiveFlow. These LiveFlow records are then sent to LiveNX, which detects anomalies by aggregating and enriching comprehensive network traffic telemetry. Traffic flow data is collected in LiveNX from NetFlow, IPFIX, sFlow, and Cisco high-speed logging and unified logging.
LiveNX’s centralized dashboard then displays these detected threats and traffic anomalies. Security Insights is open and standards-based, allowing for mapping to the Open Worldwide Application Security Project (OWASP) and MITRE ATT&CK frameworks and seamless integration with SIEM, SOAR, and XDR tools for coordinated response. If a detected threat is first seen in a SIEM or another security solution, security and network teams can leverage LiveNX and LiveWire for deeper investigation.
Both LiveWire and LiveNX are required components for Security Insights.
Use cases
This section outlines three real-world detection scenarios that demonstrate the benefits of using Security Insights.
Use case 1: Detecting anomalous Transport Layer Security activity
MITRE ATT&CK ID T1571 – Non-Standard Port
A global logistics company experiences unexpected spikes in encrypted traffic on non-standard ports. Security Insights automatically detects this pattern as “Unexpected Encryption on IANA Reserved Port”—a strong indicator of malicious tunneling activity used to hide command-and-control (C2) communications.
Investigation workflow:
- Detection (Security Insights)
- Detects encrypted traffic on port 8088, which is not typically used for secure communications.
- Maps detection to MITRE T1571 and flags the event.
- Cross-references with known IANA-reserved ports for validation and automatically alerts the security operations team.
- Analysis (LiveNX)
- Visualizes affected subnets and identifies systems generating the anomalous traffic.
- Correlates flow records across WAN and SD-WAN links, confirming the pattern is isolated to a single IoT gateway.
- Detects recurring communication intervals—a hallmark of beaconing.
- Forensics (LiveWire)
- Captures and inspects packets to confirm encrypted payloads.
- Response
- Security operations team isolates the IoT gateway and blocks all outbound traffic on unauthorized ports.
- Forensic data is exported to the SIEM for post-incident validation and compliance reporting.
Outcome: Early detection prevented malware from establishing C2 persistence, reduced time to detect from hours to minutes, and improved visibility into encrypted traffic without decryption overhead.

Figure 2. Security Insights summary dashboard and detail view in LiveNX
Use case 2: Proactive threat hunting with threat intel indicators
MITRE ATT&CK ID: T1102 – Web Service
A financial institution’s threat intelligence feed reports suspicious domains associated with a recent C2 infrastructure campaign. Using Security Insights, the security team proactively hunts across their hybrid network for any evidence of contact with those domains.
Investigation workflow:
- Detection (Security Insights)
- Imports threat intelligence indicators of compromise from an external feed and maps them to MITRE T1102.
- Performs a network-wide correlation using flow telemetry to identify outbound communications to suspicious domains.
- Flags multiple endpoints contacting the domain app-sync-storage[.]net, classified as a potential C2 web service.
- Analysis (LiveNX)
- Analysts pivot into LiveNX to visualize communication frequency and duration by endpoint.
- Correlates DNS queries and flow records to confirm repeated contact from a single subnet within the R&D network.
- Detects unusual data size patterns consistent with exfiltration via HTTPS.
- Forensics (LiveWire)
- Performs packet capture for the flagged hosts to confirm payload behavior.
- Identifies POST requests containing Base64-encoded data to the suspicious domain.
- Extracts the payload for sandbox analysis to confirm malicious exfiltration.
- Response
- Sends data to the SOAR to automatically block the compromised domains and associated IP ranges.
Outcome: Stopped stealthy C2 communications before significant business losses occurred.
Use case 3: Forensic investigation of a TLS certificate abuse attack
MITRE ATT&CK ID: T1587.003 – Digital certificates
A large healthcare provider detects irregular SSL certificate behavior across its data centers. Security Insights flags multiple self-signed TLS certificates being used in outbound traffic—a possible sign of malware using forged certificates to bypass inspection controls.
Investigation workflow:
- Detection (Security Insights)
- Identifies multiple self-signed and untrusted TLS certificates in use on internal outbound connections.
- Maps detection to MITRE T1587.003 and classifies as Unusual Certificate Activity.
- Analysis (LiveNX)
- Analysts use flow visualization to isolate traffic originating from affected systems.
- Confirms repetitive, short-lived TLS sessions from an IoT medical device subnet to an external IP.
- Detects abnormal TLS handshake intervals and cipher mismatches.
- Forensics (LiveWire)
- Captures packets for full forensic analysis.
- Confirms that outbound connections contain encrypted commands hidden within TLS payloads.
- Identifies the use of self-signed certificates generated by the malware to establish persistence.
- Response
- Integrates findings into the SIEM and SOAR for automated certificate revocation and alerting.

Figure 3. Security Insights individual packet data dashboard used for a forensic search
Outcome: Prevented C2 persistence via forged TLS certificates, enhanced compliance and audit readiness by retaining packet-level evidence, and strengthened certificate governance across the organization.
Key differentiators
Where legacy NDR is centralized, complex, and costly, Security Insights is distributed, efficient, and immediate. It quickly transforms existing LiveNX and LiveWire data into actionable and scalable security intelligence without the blind spots or burdens of traditional NDR.
These four key differentiators set Security Insights apart from NDR solutions:
Unmatched data quality and visibility—without NDR’s blind spots
Traditional NDR solutions are often constrained by limited data sources or vendor-specific integrations. Security Insights provides unified, high-fidelity visibility across every domain, LAN, WAN, SD-WAN, data center, and cloud, regardless of vendor or architecture. It ingests telemetry from multiple systems and correlates it into a single view. As a result, where NDR tools only see fragments, Security Insights offers end-to-end visibility.
Rich, multi-telemetry ingestion—while NDR depends on partial feeds
Traditional NDR solutions often rely on sampled or filtered packet data to reduce ingestion volume, which sacrifices accuracy and context. Security Insights aggregates and enriches comprehensive telemetry, NetFlow, IPFIX, sFlow, and Cisco high-speed logging and unified logging to identify hidden anomalies and patterns across the entire network fabric. This approach gives analysts the complete picture, not just a summary of traffic samples.
Full packet capture and forensic depth—without the cost and delay
Most NDR tools move massive packet datasets to a centralized cloud or data lake for analysis, which drives latency, cost, and compliance concerns. Powered by LiveWire, Security Insights performs forensic-grade packet analysis locally at the network edge. Teams can instantly pivot from flow records to full packet payloads for precise investigations without backhauling data, incurring delays, or the expense of relying on the cloud for analysis.
Edge-first analytics—real-time detection where threats begin
Traditional NDR architectures analyze data after it’s transported and aggregated, introducing delays that attackers exploit. Security Insights shifts this model, generating insights directly at the edge, where many threats originate. By detecting anomalies in real time, it shortens dwell time, reduces operational costs, and ensures sensitive data never leaves controlled environments.
Solution benefits
Security Insights empowers enterprises using LiveNX and LiveWire to modernize threat detection and response with powerful capabilities that simplify operations, accelerate investigations, and strengthen security outcomes across every environment. With Security Insights, network and security teams get these benefits:
Faster detection and response
Cut investigation time from hours to minutes with real-time visibility and actionable insights.
Advanced threat hunting
Leverage raw, unaggregated flow data to uncover hidden threats and accelerate forensics.
Unified visibility
Reduce complexity by bringing network and security data together in a single, correlated view.

Figure 4. Security Insights filter by MITRE ATT&CK ID
Appendix: Security findings
This appendix provides a list of security findings generated by LiveNX and LiveWire. These findings highlight anomalies, suspicious behaviors, and policy violations detected through flow and packet analysis. While not an exhaustive NDR catalog, they represent high-value insights that accelerate detection, investigation, and response. As LiveNX and LiveWire evolve, this library of findings continues to expand, ensuring network and security teams benefit from richer visibility and stronger outcomes over time.
| Security finding | MITRE ATT&CK ID (if applicable) |
|---|---|
| Encryption On IANA Reserved Port | T1571 |
| Kerberos Detected | |
| Kerberos RC4 Detected | |
| Malicious IP or Domain Detected | |
| Microsoft IP Detected | |
| NTLM Protocol Detected | |
| RDP On Non-Standard Port | T1571 |
| Threat Intel Indicator | T1102 |
| TLS Certificate Anomalies Detected | TLS |
| TLS Client Excessive Handshakes | TLS |
| TLS Forbidden Version | T1071.002 |
| TLS Long Lived Connection | TLS |
| TLS Missing SNI | T1587.003 |
| TLS Self-Signed Certificate | T1587.003 |
| TLS Unusual Certificate | T1587.003 |
| Unassigned Encryption | |
| Unauthorized Application Use | T1071.002 |
| Unexpected Encryption | T1571 |
| TLS Unexpected Plaintext | T1571 |
| TLS Weak Cipher Suite | |
| RDP Connection After Brute Force Attempt | T1021 |
| SSH Connection After SSH Brute Force Attempt | T1021 |
| Unauthorized Application Use | |
| RDP Brute Force Attempt Detected | T1110 |
| SSH Brute Force Attempt Detected | T1110 |
| New Encryption Protocol | T1571 |
| Found RDP On Non-Standard Port | T1571 |
| New Encryption User | T1573 |
| New Encryption Service | T1573 |
| New SSH Client Version Found | T1573 |
| New SSH Server Version Found | T1573 |
| New TLS Version Found | T1573 |
| Insecure/weak cipher | T1587.003 |
| New TLS SHA1 Found | T1588 |
| New TLS JA3C Found | T1588.004 |
| New TLS JA3S Found | T1588.004 |
| Lateral Movement Anomaly <application> | |
| Clique Expansion | |
| Interface Volumetric Anomaly | |
| Application Interface Volumetric Anomaly | |
| DSCP Interface Volumetric Anomaly | |
| Application Site Volumetric Anomaly | |
| Site Volumetric Anomaly |
Next steps
Discover how Security Insights can transform your network operations.
BlueCat’s Intelligent Network Operations (NetOps)
BlueCat’s Intelligent NetOps solutions provide the analytics and intelligence needed to enable, optimize, and secure the network to achieve business goals. With an Intelligent NetOps suite, organizations can more easily change and modernize the network as business requirements demand.