Risk
2/26/2014
12:44 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Emulex Announces Endace Fusion Connector For Sourcefire Defense Center

Connector enables streamlined access to granular network packet history

RSA CONFERENCE, SAN FRANCISCO and COSTA MESA, Calif., February 24, 2014 – Emulex Corporation (NYSE:ELX), a leader in network connectivity, monitoring and management, today announced the Endace Fusion Connector for Sourcefire Defense Center, enabling 100% packet capture at speeds up to 100Gb Ethernet (100GbE) and seamless click-through workflow between the security event and the packets on the EndaceProbe&trade Intelligent Network Recorders (INRs). This allows rapid response and root cause analysis, drastically reducing the time and operational overhead of packet data access. By narrowing the time gap between alert, investigation, and response, the overall effectiveness of the Security Operations (SecOps) team increases, translating to improved system uptime, higher customer satisfaction and increased business continuity.

"We are very pleased to add Sourcefire to our growing Endace Fusion Ecosystem&trade program," said Mike Riley, senior vice president and general manager of the Endace Division of Emulex. "The combination of Sourcefire's highly-regarded network security toolset and our packet capture capabilities provides customers with a comprehensive security solution that significantly reduces enterprise network vulnerability windows and increases the data available for post-incident forensics analysis."

The Endace Fusion Connector for Sourcefire Defense Center offers a best-of-breed, comprehensive intrusion detection system (IDS) that provides complete forensics visibility of impacted data in the case of breaches, and enables proactive prevention of future threats. The Endace Fusion Connector for Sourcefire Defense Center enables streamlined access to granular network packet history, thereby enhancing the capabilities of SecOps teams to dynamically protect their network at near real-time speeds and lowering time-to-resolution (TTR) for security incidents. It also shortens vulnerability windows for enterprises and increases the certainty of identifying what data was compromised in a breach, such as in the event of a customer credit data breach. The connector includes single-click access to EndaceVision&trade Network Visibility Software, which enables rapid drill-down analysis of the network packet history and flow, and the ability to search, visualize and interrogate historical network traffic recorded by EndaceProbe INRs.

"The integration of our joint capabilities for this new solution provide end users with a streamlined intrusion detection and identification workflow, removing ambiguity and optimizing efficiency in scenarios where TTR is critical," said Douglas Hurd, director of technical alliances, Sourcefire. "By providing single-click access to the packet data underlying a potential intrusion, network staff can quickly identify suspect transactions and take the appropriate actions to shut them down."

The new Endace Fusion Connector for Sourcefire Defense Center is available immediately as a free download from the Sourcefire community downloads page. The Endace Fusion Connector for Sourcefire Defense Center is the latest security connector to be announced as part of the Endace Fusion Ecosystem Program, which is focused on applications and partners who provide complementary capabilities for network visibility that are required to detect, investigate and resolve common networking and securit incidents.

Tweet this: News at @RSAconference: @Emulex Announces Endace Fusion Connector for @Sourcefire: http://ow.ly/tRDBO #rsac

Additional Resources:

o Read our Endace on Network Visibility blog on today's news here.

o Download the Sourcefire Solution Brief here.

o Learn more about the Endace Fusion Connector for Sourcefire Defense Center here.

o Download the Endace Fusion Connector for Sourcefire Defense Center here.

o For more information on the Fusion Ecosystem Program, click here.

Follow Emulex on Twitter.

About Emulex

Emulex, a leader in network connectivity, monitoring and management, provides hardware and software solutions for global networks that support enterprise, cloud, government and telecommunications. Emulex's products enable unrivaled end-to-end application visibility, optimization and acceleration. The Company's I/O connectivity offerings, including its line of ultra high-performance Ethernet and Fibre Channel-based connectivity products, have been designed into server and storage solutions from leading OEMs, including Cisco, Dell, EMC, Fujitsu, Hitachi, HP, Huawei, IBM, NetApp and Oracle, and can be found in the data centers of nearly all of the Fortune 1000. Emulex's monitoring and management solutions, including its portfolio of network visibility and recording products, provide organizations with complete network performance management at speeds up to 100Gb Ethernet. Emulex is headquartered in Costa Mesa, Calif., and has offices and research facilities in North America, Asia and Europe. For more information about Emulex (NYSE:ELX) please visit http://www.Emulex.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3352
Published: 2014-08-30
Cisco Intelligent Automation for Cloud (aka Cisco Cloud Portal) 2008.3_SP9 and earlier does not properly consider whether a session is a problematic NULL session, which allows remote attackers to obtain sensitive information via crafted packets, related to an "iFrame vulnerability," aka Bug ID CSCuh...

CVE-2014-3908
Published: 2014-08-30
The Amazon.com Kindle application before 4.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2010-5110
Published: 2014-08-29
DCTStream.cc in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.

CVE-2012-1503
Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.