Empower your team to resolve security incidents faster
The Problem
Access to past traffic content is critical
Poor performance and scalability
Hardware-bound legacy solutions can't decrypt and capture today's massive volume of traffic efficiently.
High infrastructure and bandwidth costs
Legacy solutions capture all content regardless of risk relevance, creating high volumes of low-interest capture.
Complexity in analysis
Analyzing the vast amounts of data collected by legacy PCAP solutions can be complex and time-consuming.
Solution Overview
Get secure and seamless access to traffic content
Easily capture decrypted traffic via specific criteria in Zscaler policy engines.
Traffic Capture enables you to incorporate capture decisions into existing policies across URL filtering, malware protection, advanced threat protection, firewall and IPS control, DNS control, and file type control.
By defining granular policies and rules for capturing specific content, you can concentrate on packets and full content related to risky events identified by advanced threat and malware detection signatures, threat intelligence, AI/ML as well as flexible and specific policy controls.
Traffic Capture is part of Zscaler Internet Access™, the world’s most-deployed security service edge (SSE) solution.
Benefits
Reduce time, effort, and cost to capture traffic content

Cut costs and complexity
Decrypt and capture traffic content without a legacy appliance-based solution, saving countless hours and expense.

Reduce infrastructure and bandwidth costs
Define policy-level criteria to capture only content associated with risky events, rather than all content, avoiding further added costs.

Safeguard your data your way
Securely store captured data as PCAP files in your preferred external storage.
Use Cases
Power superior security forensics

Capture some traffic for extended periods to support threat hunting and many forensic/incident response investigation needs.

Study and replay traffic that might have caused a threat signature or other detection to trigger a false positive.

Test new threat signatures or detections of any kind against known threat activity in real traffic content.

Capture traffic content to comply with regulatory compliance requirements.
Experimente el poder de Zero Trust Exchange de Zscaler
Una plataforma integral para proteger, simplificar y transformar su empresa.
01 Operaciones de seguridad
Reduzca el riesgo y detecte y contenga las infracciones, con información procesable de una plataforma unificada
02 Protección contra la amenaza cibernética
Proteja a los usuarios, los dispositivos y las cargas de trabajo para evitar verse comprometido y el movimiento lateral de amenazas
03 Seguridad de los datos
Aproveche la inspección completa de TLS/SSL a escala para una seguridad completa de los datos en toda la plataforma SSE
04 Zero Trust para sucursales y la nube
Conecte usuarios, dispositivos y cargas de trabajo en la sucursal, la nube y el centro de datos, y entre estos elementos.
FAQs
Packet capture (PCAP) technology captures and analyzes network packets. Security practitioners and threat researchers use this packet data in forensic analysis, incident investigation, false positives review, threat signature testing, and compliance assurance.
Packet Capture (PCAP) intercepts and records data packets traversing a network in real time. PCAP files contain IP addresses, network packet header data, HTTP request and possibly response headers, and content associated with a specific policy criteria match. An administrator can limit the volume of data captured per matched policy as well as control the frequency of capture.
Request a demo
Let our experts show you the power and efficiency of cloud-based Traffic Capture.