
“It is absolutely not only for historical analysis, “Joseph Carson, chief security scientist and advisory CISO at Thycotic, told SecurityWeek. “It usually depends on some other detection capability to point the finger at packets of interest.” “Full packet capture is purely for historical analysis,” says Oliver Tavakoli, CTO at Vectra. The value of PCAP is the ability to see and capture in detail exactly what has happened.įor this reason, many analysts believe that PCAP is best suited to (recent) historical analysis.

Analysis is left to add-ons or other security tools. It is not designed to provide real time – or any – analysis. It’s not an interpretation, it’s not a summary description – it’s the raw truth.” It’s a bit-for-bit direct copy of the exact traffic that was transmitted across the monitored network. “Packet capture has long been the gold standard of primary evidence sources for network security forensics. “The packets never lie,” says Vectra’s EMEA director, Matt Walmsley. If PCAP is such a powerful security tool, why hasn’t it already been widely adopted among the agencies? And is this movement within the federal agencies likely to migrate to the general business sector? This sudden rush to PCAP poses a couple of obvious questions. The Homeland Security Department’s Enterprise Security Operations Center stated that it considered “Full Packet Capture a cornerstone of the cyber security visibility stack enabling analysts to perform investigation analysis while also satisfying DHS security requirements.” Marine Corps (USMC), and the Missile Defense Agency (MDA) all issued requests for proposals (RFPs) and requests for information (RFIs) for PCAP solutions.

Toward the end of 2020, in the first flush of the SolarWinds debacle, the DHS, the Department of State, Aberdeen Proving Grounds, the U.S. federal agencies investigating their options. The security potential for this type of traffic monitoring is clear, and probably explains the motivation for a number of U.S. PCAP provides what CISOs seek but rarely achieve – total visibility into the network. Whether it is malware moving data around, or staff arranging a private party, it can be captured and then analyzed. If something happens on the network, PCAP knows about it.


PCAP, or full packet data capture for analysis, does what it says – it captures the entirety of every packet that comprises the network traffic (both metadata and content). PCAP Enables Defenders to See and Capture Exactly What Has Happened Across a Network, But Comes With Challenges
