Use Cases
Incident Response
SIEM Optimization
Threat Hunting
Anti-Fraud
Data Science
Developers
More
How it Works
API Embeddings & Data Science Notebooks
Graphistry for PowerBI
Docs
Video Guides
Deploy
Connect Your Data
Graph Analytics
Investigate at Scale
Repeat and Automate
Pricing & Get Started
News
Newsletter
Blog
Roadmap
Twitter Feed
LinkedIn Feed
GitHub
Company
About Us
Careers
Events
Request Demo
Services
POCs, Rapid Prototyping, and R&D
Support
Training & Workshops
Partners
Partnering
Start
Login
Masterclasses & Guides
Masterclasses
Threat Hunting (Co-hosted with Corelight)
Three data science notebooks for finding bad actors in your network logs
Splunk, Zeek/Bro, Graphistry, Jupyter Notebooks, Pandas
Guides
Investigation Automation Templates with Splunk
Graphistry CSV Viewer Mini-App
ICIJ’s “Implant Files” Medical Device Recalls
Launching Graphistry in AWS Marketplace
Public Talks
Microsoft BlueHat – Graphs for Security: 100X Investigations
(demo-heavy)
Infosec Jupyterthon – GPU & Graph One-Liners for Python Jupyter Notebooks
(notebooks)
Corresponding notebooks:
RAPIDS Academy