Risk
2/26/2014
12:44 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Emulex Announces Endace Fusion Connector For Sourcefire Defense Center

Connector enables streamlined access to granular network packet history

RSA CONFERENCE, SAN FRANCISCO and COSTA MESA, Calif., February 24, 2014 – Emulex Corporation (NYSE:ELX), a leader in network connectivity, monitoring and management, today announced the Endace Fusion Connector for Sourcefire Defense Center, enabling 100% packet capture at speeds up to 100Gb Ethernet (100GbE) and seamless click-through workflow between the security event and the packets on the EndaceProbe&trade Intelligent Network Recorders (INRs). This allows rapid response and root cause analysis, drastically reducing the time and operational overhead of packet data access. By narrowing the time gap between alert, investigation, and response, the overall effectiveness of the Security Operations (SecOps) team increases, translating to improved system uptime, higher customer satisfaction and increased business continuity.

"We are very pleased to add Sourcefire to our growing Endace Fusion Ecosystem&trade program," said Mike Riley, senior vice president and general manager of the Endace Division of Emulex. "The combination of Sourcefire's highly-regarded network security toolset and our packet capture capabilities provides customers with a comprehensive security solution that significantly reduces enterprise network vulnerability windows and increases the data available for post-incident forensics analysis."

The Endace Fusion Connector for Sourcefire Defense Center offers a best-of-breed, comprehensive intrusion detection system (IDS) that provides complete forensics visibility of impacted data in the case of breaches, and enables proactive prevention of future threats. The Endace Fusion Connector for Sourcefire Defense Center enables streamlined access to granular network packet history, thereby enhancing the capabilities of SecOps teams to dynamically protect their network at near real-time speeds and lowering time-to-resolution (TTR) for security incidents. It also shortens vulnerability windows for enterprises and increases the certainty of identifying what data was compromised in a breach, such as in the event of a customer credit data breach. The connector includes single-click access to EndaceVision&trade Network Visibility Software, which enables rapid drill-down analysis of the network packet history and flow, and the ability to search, visualize and interrogate historical network traffic recorded by EndaceProbe INRs.

"The integration of our joint capabilities for this new solution provide end users with a streamlined intrusion detection and identification workflow, removing ambiguity and optimizing efficiency in scenarios where TTR is critical," said Douglas Hurd, director of technical alliances, Sourcefire. "By providing single-click access to the packet data underlying a potential intrusion, network staff can quickly identify suspect transactions and take the appropriate actions to shut them down."

The new Endace Fusion Connector for Sourcefire Defense Center is available immediately as a free download from the Sourcefire community downloads page. The Endace Fusion Connector for Sourcefire Defense Center is the latest security connector to be announced as part of the Endace Fusion Ecosystem Program, which is focused on applications and partners who provide complementary capabilities for network visibility that are required to detect, investigate and resolve common networking and securit incidents.

Tweet this: News at @RSAconference: @Emulex Announces Endace Fusion Connector for @Sourcefire: http://ow.ly/tRDBO #rsac

Additional Resources:

o Read our Endace on Network Visibility blog on today's news here.

o Download the Sourcefire Solution Brief here.

o Learn more about the Endace Fusion Connector for Sourcefire Defense Center here.

o Download the Endace Fusion Connector for Sourcefire Defense Center here.

o For more information on the Fusion Ecosystem Program, click here.

Follow Emulex on Twitter.

About Emulex

Emulex, a leader in network connectivity, monitoring and management, provides hardware and software solutions for global networks that support enterprise, cloud, government and telecommunications. Emulex's products enable unrivaled end-to-end application visibility, optimization and acceleration. The Company's I/O connectivity offerings, including its line of ultra high-performance Ethernet and Fibre Channel-based connectivity products, have been designed into server and storage solutions from leading OEMs, including Cisco, Dell, EMC, Fujitsu, Hitachi, HP, Huawei, IBM, NetApp and Oracle, and can be found in the data centers of nearly all of the Fortune 1000. Emulex's monitoring and management solutions, including its portfolio of network visibility and recording products, provide organizations with complete network performance management at speeds up to 100Gb Ethernet. Emulex is headquartered in Costa Mesa, Calif., and has offices and research facilities in North America, Asia and Europe. For more information about Emulex (NYSE:ELX) please visit http://www.Emulex.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0750
Published: 2015-05-22
The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786.

CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.