News
3/24/2014
10:20 AM
50%
50%

Lumeta Announces Integration With Allgress

Integrated solution includes centralized data store

Somerset, NJ and Livermore, CA – March 24, 2014 – Lumeta Corporation, the leader in network situational awareness, announced today that its IPsonar and ESI solutions are now seamlessly integrated with the Allgress Insight Risk Management Suite. Lumeta provides comprehensive visibility into all pathways and connected devices on a network, including leaks and vulnerabilities – information that the Allgress solution will aggregate with additional data and turn into meaningful, actionable risk-specific intelligence.

Lumeta's network situational awareness solutions use active scanning and passive listening techniques to discover all network connections and devices – including previously unknown networks, leak paths, and the network perimeter. Gathering comprehensive intelligence on a network is a foundational step to any security and risk management program.

The insight uncovered by Lumeta is fed into the Vulnerability Management module of the Allgress Insight Risk Management Suite, and then shared across all integrated Allgress product modules for analytics, trend analysis and to better understand attack vectoring.

Allgress enables IT risk and security professionals to apply business context to information technology risk management so executives can rapidly make informed decisions that align with business priorities. Allgress collects data from disparate enterprise risk silos to pull together a unified view of information security and compliance risk posture across a global network. Covering the areas of vulnerability management, incident management, risk analysis, and security and compliance assessment, Allgress delivers highly visual and intuitive heat maps and compliance reports that translate that data into the language of business.

"By integrating with Allgress, we are helping our customers align IT risk management in the context of supporting business objectives," said Matt Webster, chief technology officer of Lumeta.

Key capabilities of the integrated solution include:

Centralized data store that allows you to consolidate and filter all vulnerability scanning data

Demonstrate in real time the true impact of changes on the security profile

Trending and time-series views that reveal vulnerability volumes, severity levels and mitigation progress

A visual and comprehensive picture of holistic risk

Compare network segments to see where threats are most prevalent in order to prioritize resource allocation

"By integrating Lumeta's discovery capabilities as a foundation, the Allgress solution will be able to provide more comprehensive risk management capabilities and give CISOs the true risk impact of each corporate initiative," said Gordon Shevlin, chief executive officer of Allgress.

Availability

The Lumeta connector is available now 'out of the box' within Allgress v5.1; no separate file package is required nor is there additional cost. (Current clients of Allgress simply need to upgrade to v5.1 to take advantage of the integration functionality.)

About Allgress, Inc.

Since 2008, Allgress has been enabling enterprise risk, security, and compliance professionals the ability to efficiently manage their risk posture. By utilizing advanced visualization, automation, streamlined workflows, and the integration of existing data feeds, Allgress reduces the complexity and cost of risk management. Unlike other risk management solutions, Allgress customers derive value in days rather than months. For more information, more visit www.allgress.com or contact us at info@allgress.com or 925-579-0002.

About Lumeta Corporation

Lumeta's network situational awareness solutions identify and map every IP connected device on a network and discover inbound and outbound leak paths, giving IT management a clear, comprehensive assessment of network vulnerabilities, cyber-threat risks and policy violations from network edge to core. Lumeta provides foundational intelligence required to make decisions impacting security, compliance and availability. Lumeta's products deliver an efficient and cost-effective process to streamline network consolidation (M&A) projects, as well as addresses today's security initiatives associated with BYOD, Mobility, Cloud, Outsourcing, SDN, Access Control and Big Data which increase the complexity of a network and compromise traditional security defenses. Lumeta optimizes other network and security product investments with accurate and fact-based network intelligence. Headquartered in Somerset, New Jersey, Lumeta has operations throughout the world. More information is available at www.lumeta.com

# # #

Lumeta, the Lumeta logo, IPsonar and the IPsonar logo are trademarks and service marks of the Lumeta Corporation. Other product and company names appearing in this document may be trademarks of their respective owners.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

CVE-2014-8711
Published: 2014-11-22
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?