Watch this video on YouTube
Isabella, the head of the SOC Team, aims to leverage network traffic analysis for promptly detecting intrusions across her network of multiple hosts. Which tool is most appropriate for accomplishing this objective?