10:20 AM

Lumeta Announces Integration With Allgress

Integrated solution includes centralized data store

Somerset, NJ and Livermore, CA – March 24, 2014 – Lumeta Corporation, the leader in network situational awareness, announced today that its IPsonar and ESI solutions are now seamlessly integrated with the Allgress Insight Risk Management Suite. Lumeta provides comprehensive visibility into all pathways and connected devices on a network, including leaks and vulnerabilities – information that the Allgress solution will aggregate with additional data and turn into meaningful, actionable risk-specific intelligence.

Lumeta's network situational awareness solutions use active scanning and passive listening techniques to discover all network connections and devices – including previously unknown networks, leak paths, and the network perimeter. Gathering comprehensive intelligence on a network is a foundational step to any security and risk management program.

The insight uncovered by Lumeta is fed into the Vulnerability Management module of the Allgress Insight Risk Management Suite, and then shared across all integrated Allgress product modules for analytics, trend analysis and to better understand attack vectoring.

Allgress enables IT risk and security professionals to apply business context to information technology risk management so executives can rapidly make informed decisions that align with business priorities. Allgress collects data from disparate enterprise risk silos to pull together a unified view of information security and compliance risk posture across a global network. Covering the areas of vulnerability management, incident management, risk analysis, and security and compliance assessment, Allgress delivers highly visual and intuitive heat maps and compliance reports that translate that data into the language of business.

"By integrating with Allgress, we are helping our customers align IT risk management in the context of supporting business objectives," said Matt Webster, chief technology officer of Lumeta.

Key capabilities of the integrated solution include:

Centralized data store that allows you to consolidate and filter all vulnerability scanning data

Demonstrate in real time the true impact of changes on the security profile

Trending and time-series views that reveal vulnerability volumes, severity levels and mitigation progress

A visual and comprehensive picture of holistic risk

Compare network segments to see where threats are most prevalent in order to prioritize resource allocation

"By integrating Lumeta's discovery capabilities as a foundation, the Allgress solution will be able to provide more comprehensive risk management capabilities and give CISOs the true risk impact of each corporate initiative," said Gordon Shevlin, chief executive officer of Allgress.


The Lumeta connector is available now 'out of the box' within Allgress v5.1; no separate file package is required nor is there additional cost. (Current clients of Allgress simply need to upgrade to v5.1 to take advantage of the integration functionality.)

About Allgress, Inc.

Since 2008, Allgress has been enabling enterprise risk, security, and compliance professionals the ability to efficiently manage their risk posture. By utilizing advanced visualization, automation, streamlined workflows, and the integration of existing data feeds, Allgress reduces the complexity and cost of risk management. Unlike other risk management solutions, Allgress customers derive value in days rather than months. For more information, more visit or contact us at [email protected] or 925-579-0002.

About Lumeta Corporation

Lumeta's network situational awareness solutions identify and map every IP connected device on a network and discover inbound and outbound leak paths, giving IT management a clear, comprehensive assessment of network vulnerabilities, cyber-threat risks and policy violations from network edge to core. Lumeta provides foundational intelligence required to make decisions impacting security, compliance and availability. Lumeta's products deliver an efficient and cost-effective process to streamline network consolidation (M&A) projects, as well as addresses today's security initiatives associated with BYOD, Mobility, Cloud, Outsourcing, SDN, Access Control and Big Data which increase the complexity of a network and compromise traditional security defenses. Lumeta optimizes other network and security product investments with accurate and fact-based network intelligence. Headquartered in Somerset, New Jersey, Lumeta has operations throughout the world. More information is available at

# # #

Lumeta, the Lumeta logo, IPsonar and the IPsonar logo are trademarks and service marks of the Lumeta Corporation. Other product and company names appearing in this document may be trademarks of their respective owners.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.