Videos, Webinars

Navigating network and cybersecurity pcap analysis in CloudShark 4.0

Navigating network and cybersecurity pcap analysis in CloudShark 4.0

Network and security teams rely on packet captures (pcaps) as the ultimate source of truth for diagnosing performance issues, investigating security threats, and ensuring compliance.

CloudShark Enterprise makes enterprise-wide packet capture analysis more manageable and accessible than ever. It streamlines workflows, improves collaboration, and removes the roadblocks that make packet analysis a siloed, expert-only function. 

Watch our latest webinar with Tom Peterson, Senior Technology Specialist at QA Cafe, as he shows you the best ways to navigate network and security issues using pcaps when you have the right tools:

(or watch this video on YouTube)

This webinar and the article below highlight CloudShark 4.0's new features, their impact on enterprise-grade packet analysis, and how CIOs, CISOs, and SOC/NOC leaders can use these enhancements to scale and optimize their network security operations.

What’s New in CloudShark Enterprise 4.0?

CloudShark has long provided a centralized, structured approach to packet capture analysis, but version 4.0 introduces key upgrades that improve usability, deployment, and scalability.

1. Flexible column management

Packet captures contain an overwhelming amount of data, and navigating them effectively requires organizing and prioritizing key information.

New in CloudShark 4.0:

  • Drag-and-drop column customization for faster, more intuitive organization.
  • Resizable and reorderable columns, allowing analysts to focus on the data that matters most.
  • Persistent column settings, so that users can maintain a consistent view across multiple captures.

By making it easier to customize how packet data is displayed, CloudShark Enterprise 4.0 ensures that analysts spend less time searching and more time analyzing.

2. Enhanced packet navigation

Analyzing large pcaps often requires jumping between different packets, streams, and filters - and losing your place can slow down investigations. 

New in CloudShark 4.0

  • Status bar that shows the percent of packets currently viewed, ensuring that users always know how much data they’re working with.
  • Packet count indicators for display filters, providing instant feedback on how many packets match a given query.
  • Improved follow-stream functionality, making it easier to track conversations across encrypted and compressed traffic.

With these enhancements, CloudShark Enterprise 4.0 speeds up packet analysis workflows, allowing teams to investigate incidents faster and more precisely.

3. Improved display filtering

Packet filtering is one of the most important aspects of analysis, but writing complex filters can be cumbersome, inconsistent, and error-prone.

New in CloudShark 4.0:

  • Autocomplete filter suggestions now include helpful descriptions, helping users quickly find the right filter syntax.
  • Drag-and-drop filter field selection, eliminating the need to memorize field names.
  • Persistent filters across different analysis views, making it easier to pivot between perspectives without losing search criteria.

CloudShark 4.0 simplifies and accelerates the filtering process, making it easier for novice and experienced analysts to isolate relevant data and extract actionable insights.

4. Advanced stream analysis

One of the biggest challenges in modern packet analysis is dealing with encrypted and compressed traffic, which can obscure critical insights.

New in CloudShark 4.0:

  • Decryption-aware stream views that enable analysts to view decrypted packet data directly in the analysis pane.
  • Direct access to follow-stream within the three-pane view powered by Packet Viewer
  • Multi-tab decode view, allowing users to seamlessly switch between raw, decrypted, and structured protocol views.

These upgrades enhance CloudShark’s ability to handle complex, real-world traffic patterns—giving security and network teams the tools to analyze even the most challenging pcaps.

New deployment & licensing model: scale packet analysis without limits

Alongside these usability enhancements, CloudShark Enterprise 4.0 introduces a major shift in how organizations can deploy and scale packet analysis across their networks.

1. Pre-configured OVA deployment

Enterprises can now deploy CloudShark Enterprise as a pre-configured virtual appliance (OVA), making setup faster and easier within today’s containerized environments. This ready-to-use virtual appliance can be deployed immediately and has standardized installation across enterprise environments.

2. Coming soon: unlimited enterprise licensing

CloudShark Enterprise will soon move to an unlimited licensing model, eliminating per-user constraints and allowing organizations to deploy instances wherever required. This includes:

  • Unlimited users and instances, ensuring that packet analysis is available across the entire organization.
  • Flexible deployment, allowing teams to scale up or down without licensing limitations.
  • Predictable cost structure, removing the administrative burden of tracking per-seat licenses.

This change makes CloudShark Enterprise a true enterprise-wide solution, removing barriers to adoption and ensuring that packet analysis is a net benefit to enterprises rather than an afterthought.

Why CloudShark 4.0 matters for CIOs, CISOs, and SOC/NOC teams

With CloudShark Enterprise 4.0, packet analysis becomes a strategic advantage for organizations seeking to:

  • Accelerate network and security investigations by improving packet filtering, navigation, and visualization.
  • Standardize packet analysis workflows across security, IT, and network teams.
  • Scale operations efficiently with unlimited licensing and simplified deployment.
  • Empower teams at all skill levels by making packet data more accessible and actionable.

This update represents a significant step toward accessible packet analysis across the enterprise. It gives every team the tools to investigate threats, optimize performance, and enhance security posture.