News
3/24/2014
10:20 AM
50%
50%

Lumeta Announces Integration With Allgress

Integrated solution includes centralized data store

Somerset, NJ and Livermore, CA – March 24, 2014 – Lumeta Corporation, the leader in network situational awareness, announced today that its IPsonar and ESI solutions are now seamlessly integrated with the Allgress Insight Risk Management Suite. Lumeta provides comprehensive visibility into all pathways and connected devices on a network, including leaks and vulnerabilities – information that the Allgress solution will aggregate with additional data and turn into meaningful, actionable risk-specific intelligence.

Lumeta's network situational awareness solutions use active scanning and passive listening techniques to discover all network connections and devices – including previously unknown networks, leak paths, and the network perimeter. Gathering comprehensive intelligence on a network is a foundational step to any security and risk management program.

The insight uncovered by Lumeta is fed into the Vulnerability Management module of the Allgress Insight Risk Management Suite, and then shared across all integrated Allgress product modules for analytics, trend analysis and to better understand attack vectoring.

Allgress enables IT risk and security professionals to apply business context to information technology risk management so executives can rapidly make informed decisions that align with business priorities. Allgress collects data from disparate enterprise risk silos to pull together a unified view of information security and compliance risk posture across a global network. Covering the areas of vulnerability management, incident management, risk analysis, and security and compliance assessment, Allgress delivers highly visual and intuitive heat maps and compliance reports that translate that data into the language of business.

"By integrating with Allgress, we are helping our customers align IT risk management in the context of supporting business objectives," said Matt Webster, chief technology officer of Lumeta.

Key capabilities of the integrated solution include:

Centralized data store that allows you to consolidate and filter all vulnerability scanning data

Demonstrate in real time the true impact of changes on the security profile

Trending and time-series views that reveal vulnerability volumes, severity levels and mitigation progress

A visual and comprehensive picture of holistic risk

Compare network segments to see where threats are most prevalent in order to prioritize resource allocation

"By integrating Lumeta's discovery capabilities as a foundation, the Allgress solution will be able to provide more comprehensive risk management capabilities and give CISOs the true risk impact of each corporate initiative," said Gordon Shevlin, chief executive officer of Allgress.

Availability

The Lumeta connector is available now 'out of the box' within Allgress v5.1; no separate file package is required nor is there additional cost. (Current clients of Allgress simply need to upgrade to v5.1 to take advantage of the integration functionality.)

About Allgress, Inc.

Since 2008, Allgress has been enabling enterprise risk, security, and compliance professionals the ability to efficiently manage their risk posture. By utilizing advanced visualization, automation, streamlined workflows, and the integration of existing data feeds, Allgress reduces the complexity and cost of risk management. Unlike other risk management solutions, Allgress customers derive value in days rather than months. For more information, more visit www.allgress.com or contact us at info@allgress.com or 925-579-0002.

About Lumeta Corporation

Lumeta's network situational awareness solutions identify and map every IP connected device on a network and discover inbound and outbound leak paths, giving IT management a clear, comprehensive assessment of network vulnerabilities, cyber-threat risks and policy violations from network edge to core. Lumeta provides foundational intelligence required to make decisions impacting security, compliance and availability. Lumeta's products deliver an efficient and cost-effective process to streamline network consolidation (M&A) projects, as well as addresses today's security initiatives associated with BYOD, Mobility, Cloud, Outsourcing, SDN, Access Control and Big Data which increase the complexity of a network and compromise traditional security defenses. Lumeta optimizes other network and security product investments with accurate and fact-based network intelligence. Headquartered in Somerset, New Jersey, Lumeta has operations throughout the world. More information is available at www.lumeta.com

# # #

Lumeta, the Lumeta logo, IPsonar and the IPsonar logo are trademarks and service marks of the Lumeta Corporation. Other product and company names appearing in this document may be trademarks of their respective owners.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7178
Published: 2014-11-28
Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function.

CVE-2014-7850
Published: 2014-11-28
Cross-site scripting (XSS) vulnerability in the Web UI in FreeIPA 4.x before 4.1.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to breadcrumb navigation.

CVE-2014-8423
Published: 2014-11-28
Unspecified vulnerability in the management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to execute arbitrary commands via unknown vectors.

CVE-2014-8424
Published: 2014-11-28
ARRIS VAP2500 before FW08.41 does not properly validate passwords, which allows remote attackers to bypass authentication.

CVE-2014-8425
Published: 2014-11-28
The management portal in ARRIS VAP2500 before FW08.41 allows remote attackers to obtain credentials by reading the configuration files.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?