// Replace the content in <> // Identify your target audience and explain how/why they would use this Quick Start. //Avoid borrowing text from third-party websites (copying text from AWS service documentation is fine). Also, avoid marketing-speak, focusing instead on the technical aspect. This Quick Start reference deployment guide provides instructions for deploying an out-of-band, open-source monitoring stack for AWS. Launched tools come with the {partner-company-name} Session Key Intercept (SKI) platform for TLS decryption pre-configured on the AWS Cloud. The stack includes the following open-source tools: * Arkime -- A large-scale, open-source, indexed packet-capture-and-search system. * Suricata -- A high-performance engine that comprises a network intrusion detection system (IDS), an intrusion prevention system (IPS), and network security monitoring (NSM). * Wireshark -- A free, open-source packet analyzer for network troubleshooting. * Zeek -- A powerful network analysis framework used for intrusion detection by looking at anomalous network activity to find suspicious data flows. This Quick Start is for users who want to identify malicious activity, insider threats, and data leakage within their virtual private cloud (VPC) and Amazon Elastic Compute Cloud (Amazon EC2) instances with decrypted visibility.