Risk
2/26/2014
12:44 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Emulex Announces Endace Fusion Connector For Sourcefire Defense Center

Connector enables streamlined access to granular network packet history

RSA CONFERENCE, SAN FRANCISCO and COSTA MESA, Calif., February 24, 2014 – Emulex Corporation (NYSE:ELX), a leader in network connectivity, monitoring and management, today announced the Endace Fusion Connector for Sourcefire Defense Center, enabling 100% packet capture at speeds up to 100Gb Ethernet (100GbE) and seamless click-through workflow between the security event and the packets on the EndaceProbe&trade Intelligent Network Recorders (INRs). This allows rapid response and root cause analysis, drastically reducing the time and operational overhead of packet data access. By narrowing the time gap between alert, investigation, and response, the overall effectiveness of the Security Operations (SecOps) team increases, translating to improved system uptime, higher customer satisfaction and increased business continuity.

"We are very pleased to add Sourcefire to our growing Endace Fusion Ecosystem&trade program," said Mike Riley, senior vice president and general manager of the Endace Division of Emulex. "The combination of Sourcefire's highly-regarded network security toolset and our packet capture capabilities provides customers with a comprehensive security solution that significantly reduces enterprise network vulnerability windows and increases the data available for post-incident forensics analysis."

The Endace Fusion Connector for Sourcefire Defense Center offers a best-of-breed, comprehensive intrusion detection system (IDS) that provides complete forensics visibility of impacted data in the case of breaches, and enables proactive prevention of future threats. The Endace Fusion Connector for Sourcefire Defense Center enables streamlined access to granular network packet history, thereby enhancing the capabilities of SecOps teams to dynamically protect their network at near real-time speeds and lowering time-to-resolution (TTR) for security incidents. It also shortens vulnerability windows for enterprises and increases the certainty of identifying what data was compromised in a breach, such as in the event of a customer credit data breach. The connector includes single-click access to EndaceVision&trade Network Visibility Software, which enables rapid drill-down analysis of the network packet history and flow, and the ability to search, visualize and interrogate historical network traffic recorded by EndaceProbe INRs.

"The integration of our joint capabilities for this new solution provide end users with a streamlined intrusion detection and identification workflow, removing ambiguity and optimizing efficiency in scenarios where TTR is critical," said Douglas Hurd, director of technical alliances, Sourcefire. "By providing single-click access to the packet data underlying a potential intrusion, network staff can quickly identify suspect transactions and take the appropriate actions to shut them down."

The new Endace Fusion Connector for Sourcefire Defense Center is available immediately as a free download from the Sourcefire community downloads page. The Endace Fusion Connector for Sourcefire Defense Center is the latest security connector to be announced as part of the Endace Fusion Ecosystem Program, which is focused on applications and partners who provide complementary capabilities for network visibility that are required to detect, investigate and resolve common networking and securit incidents.

Tweet this: News at @RSAconference: @Emulex Announces Endace Fusion Connector for @Sourcefire: http://ow.ly/tRDBO #rsac

Additional Resources:

o Read our Endace on Network Visibility blog on today's news here.

o Download the Sourcefire Solution Brief here.

o Learn more about the Endace Fusion Connector for Sourcefire Defense Center here.

o Download the Endace Fusion Connector for Sourcefire Defense Center here.

o For more information on the Fusion Ecosystem Program, click here.

Follow Emulex on Twitter.

About Emulex

Emulex, a leader in network connectivity, monitoring and management, provides hardware and software solutions for global networks that support enterprise, cloud, government and telecommunications. Emulex's products enable unrivaled end-to-end application visibility, optimization and acceleration. The Company's I/O connectivity offerings, including its line of ultra high-performance Ethernet and Fibre Channel-based connectivity products, have been designed into server and storage solutions from leading OEMs, including Cisco, Dell, EMC, Fujitsu, Hitachi, HP, Huawei, IBM, NetApp and Oracle, and can be found in the data centers of nearly all of the Fortune 1000. Emulex's monitoring and management solutions, including its portfolio of network visibility and recording products, provide organizations with complete network performance management at speeds up to 100Gb Ethernet. Emulex is headquartered in Costa Mesa, Calif., and has offices and research facilities in North America, Asia and Europe. For more information about Emulex (NYSE:ELX) please visit http://www.Emulex.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5700
Published: 2014-09-22
Multiple cross-site scripting (XSS) vulnerabilities in Baby Gekko before 1.2.2f allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to admin/index.php or the (2) username or (3) password parameter in blocks/loginbox/loginbox.template.php to index.php. NOTE: some o...

CVE-2014-0484
Published: 2014-09-22
The Debian acpi-support package before 0.140-5+deb7u3 allows local users to gain privileges via vectors related to the "user's environment."

CVE-2014-2942
Published: 2014-09-22
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.

CVE-2014-3595
Published: 2014-09-22
Cross-site scripting (XSS) vulnerability in spacewalk-java 1.2.39, 1.7.54, and 2.0.2 in Spacewalk and Red Hat Network (RHN) Satellite 5.4 through 5.6 allows remote attackers to inject arbitrary web script or HTML via a crafted request that is not properly handled when logging.

CVE-2014-3635
Published: 2014-09-22
Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows remote attackers to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one m...

Best of the Web
Dark Reading Radio