Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/29/2012
05:07 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lumeta Announces IPsonar 5.4

New offering highlights areas of the network edge that intruders can infiltrate to potentially leak customer data, intellectual property and more out of enterprise networks

SOMERSET, N.J.--(BUSINESS WIRE)--Lumeta Corporation, the pioneer in network discovery, visualization and network leak detection solutions for large enterprises and government agencies, today announced the latest release of IPsonar', which now includes Enhanced Perimeter Discovery (EPD).

IPsonar' discovers the comprehensive network perimeter and clearly demarcates between the “known” and “unknown” in your network. With its patented leak detection and network discovery capabilities, IPsonar detects, identifies, maps and analyzes every device on the network, outlining a clear picture of the first line of defense in network security. By verifying the behavior of firewalls and other network devices, IPsonar identifies gaps in perimeter defenses – or “leaks” – that compromise network security and put the enterprise at risk.

“Because of increased enterprise threats such as APTs and rogue insiders, as well as smarter malware, we dramatically improved IPsonar’s detection capabilities in our latest release by incorporating Enhanced Perimeter Discovery”, said Michael Markulec, CEO of Lumeta Corporation. “By providing real-time visibility into the edge of the Enterprise network and identifying potentially dangerous activity, IPsonar provides greater security and assurance that potential leaks are stopped before they can be exploited.”

As the scope of the network perimeter continues to increase through mobile devices, VPN, and other technologies, traditional methods for identifying the perimeter of the network are no longer enough because they will be blocked or thwarted by more sophisticated users and devices. Enhanced Perimeter Discovery (EPD) uses a targeted approach to identify devices on the network that have the ability to pass traffic out of the enterprise and into unauthorized or even dangerous networks. Often these devices are not traditional routers, but enterprise servers, workstations and other systems that are targeted for exploitation by attackers and malware. When these systems forward traffic to unknown, unauthorized or untrusted networks, IPsonar’s EPD immediately detects and alerts on the complete context of the network conversation, including details on the device or host and the addresses and networks connected to, enabling an unprecedented view of potential holes in your network perimeter.

Enhanced Perimeter Discovery enables Government and Enterprise customers to:

Discover devices and hosts on the network that are not compliant with network traffic policy Determine which devices are serving as egress points to unknown, unauthorized or untrusted networks Identify network vulnerabilities that put the organization at risk

By proving network and security personnel with real-time information to remediate potentially damaging network conversations, IPsonar gives customers the tools they need to discover, document, and defend the TRUE network perimeter.

Additional new features and improvements available in IPsonar 5.4 include:

Data Push. IPsonar reports now appear on the reporting interface menu as they are completed on the server – there is no need to refresh the browser. Additionally, IPsonar now provides automated, real-time and dynamic updates for multiple users, including user-created views and dashboards as well as custom reports. Enhanced Visualization. IPsonar visually maps the complete context of connections, allows users to easily focus on specific areas of interest and drill-down to investigate specific network segments. The node menu has also been enhanced to display the details of any node, enabling quicker access to relevant data. Supplemental Discovery. IPsonar allows IP addresses discovered during Layer 2 Discovery to be fed back into other components of the product, including Host Discovery, Device Discovery, and Leak Discovery, enabling more thorough investigative analysis.

For more information visit: www.lumeta.com or follow us on Twitter @lumeta.

About Lumeta Corporation

Lumeta empowers large enterprise and government agencies with global network visibility, allowing them to understand how changes to their networks affects security, availability, and compliance.

Lumeta’s IPsonar is the industry’s only network discovery and visibility solution that discovers and maps every asset on a network, including assets not currently under management. This capability enables IT professionals to analyze the connectivity between assets and networks, uncover risk patterns, and automate the enforcement of network policies.

With this level of network situational awareness, IT organizations can harden security, improve business continuity, and deploy new services without impacting its ability to deliver existing services.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3493
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
CVE-2021-3492
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...