News
3/24/2014
10:20 AM
Connect Directly
RSS
E-Mail
50%
50%

Lumeta Announces Integration With Allgress

Integrated solution includes centralized data store

Somerset, NJ and Livermore, CA – March 24, 2014 – Lumeta Corporation, the leader in network situational awareness, announced today that its IPsonar and ESI solutions are now seamlessly integrated with the Allgress Insight Risk Management Suite. Lumeta provides comprehensive visibility into all pathways and connected devices on a network, including leaks and vulnerabilities – information that the Allgress solution will aggregate with additional data and turn into meaningful, actionable risk-specific intelligence.

Lumeta's network situational awareness solutions use active scanning and passive listening techniques to discover all network connections and devices – including previously unknown networks, leak paths, and the network perimeter. Gathering comprehensive intelligence on a network is a foundational step to any security and risk management program.

The insight uncovered by Lumeta is fed into the Vulnerability Management module of the Allgress Insight Risk Management Suite, and then shared across all integrated Allgress product modules for analytics, trend analysis and to better understand attack vectoring.

Allgress enables IT risk and security professionals to apply business context to information technology risk management so executives can rapidly make informed decisions that align with business priorities. Allgress collects data from disparate enterprise risk silos to pull together a unified view of information security and compliance risk posture across a global network. Covering the areas of vulnerability management, incident management, risk analysis, and security and compliance assessment, Allgress delivers highly visual and intuitive heat maps and compliance reports that translate that data into the language of business.

"By integrating with Allgress, we are helping our customers align IT risk management in the context of supporting business objectives," said Matt Webster, chief technology officer of Lumeta.

Key capabilities of the integrated solution include:

Centralized data store that allows you to consolidate and filter all vulnerability scanning data

Demonstrate in real time the true impact of changes on the security profile

Trending and time-series views that reveal vulnerability volumes, severity levels and mitigation progress

A visual and comprehensive picture of holistic risk

Compare network segments to see where threats are most prevalent in order to prioritize resource allocation

"By integrating Lumeta's discovery capabilities as a foundation, the Allgress solution will be able to provide more comprehensive risk management capabilities and give CISOs the true risk impact of each corporate initiative," said Gordon Shevlin, chief executive officer of Allgress.

Availability

The Lumeta connector is available now 'out of the box' within Allgress v5.1; no separate file package is required nor is there additional cost. (Current clients of Allgress simply need to upgrade to v5.1 to take advantage of the integration functionality.)

About Allgress, Inc.

Since 2008, Allgress has been enabling enterprise risk, security, and compliance professionals the ability to efficiently manage their risk posture. By utilizing advanced visualization, automation, streamlined workflows, and the integration of existing data feeds, Allgress reduces the complexity and cost of risk management. Unlike other risk management solutions, Allgress customers derive value in days rather than months. For more information, more visit www.allgress.com or contact us at info@allgress.com or 925-579-0002.

About Lumeta Corporation

Lumeta's network situational awareness solutions identify and map every IP connected device on a network and discover inbound and outbound leak paths, giving IT management a clear, comprehensive assessment of network vulnerabilities, cyber-threat risks and policy violations from network edge to core. Lumeta provides foundational intelligence required to make decisions impacting security, compliance and availability. Lumeta's products deliver an efficient and cost-effective process to streamline network consolidation (M&A) projects, as well as addresses today's security initiatives associated with BYOD, Mobility, Cloud, Outsourcing, SDN, Access Control and Big Data which increase the complexity of a network and compromise traditional security defenses. Lumeta optimizes other network and security product investments with accurate and fact-based network intelligence. Headquartered in Somerset, New Jersey, Lumeta has operations throughout the world. More information is available at www.lumeta.com

# # #

Lumeta, the Lumeta logo, IPsonar and the IPsonar logo are trademarks and service marks of the Lumeta Corporation. Other product and company names appearing in this document may be trademarks of their respective owners.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7484
Published: 2014-10-20
The Coca-Cola FM Guatemala (aka com.enyetech.radio.coca_cola.fm_gu) application 2.0.41725 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7485
Published: 2014-10-20
The Not Lost Just Somewhere Else (aka it.tinytap.attsa.notlost) application 1.6.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7486
Published: 2014-10-20
The Mitsubishi Road Assist (aka com.agero.mitsubishi) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7487
Published: 2014-10-20
The ADT Aesthetic Dentistry Today (aka com.magazinecloner.aestheticdentistry) application @7F080181 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7488
Published: 2014-10-20
The Vineyard All In (aka com.wVineyardAllIn) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.