Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

3/24/2014
10:20 AM
50%
50%

Lumeta Announces Integration With Allgress

Integrated solution includes centralized data store

Somerset, NJ and Livermore, CA – March 24, 2014 – Lumeta Corporation, the leader in network situational awareness, announced today that its IPsonar and ESI solutions are now seamlessly integrated with the Allgress Insight Risk Management Suite. Lumeta provides comprehensive visibility into all pathways and connected devices on a network, including leaks and vulnerabilities – information that the Allgress solution will aggregate with additional data and turn into meaningful, actionable risk-specific intelligence.

Lumeta's network situational awareness solutions use active scanning and passive listening techniques to discover all network connections and devices – including previously unknown networks, leak paths, and the network perimeter. Gathering comprehensive intelligence on a network is a foundational step to any security and risk management program.

The insight uncovered by Lumeta is fed into the Vulnerability Management module of the Allgress Insight Risk Management Suite, and then shared across all integrated Allgress product modules for analytics, trend analysis and to better understand attack vectoring.

Allgress enables IT risk and security professionals to apply business context to information technology risk management so executives can rapidly make informed decisions that align with business priorities. Allgress collects data from disparate enterprise risk silos to pull together a unified view of information security and compliance risk posture across a global network. Covering the areas of vulnerability management, incident management, risk analysis, and security and compliance assessment, Allgress delivers highly visual and intuitive heat maps and compliance reports that translate that data into the language of business.

"By integrating with Allgress, we are helping our customers align IT risk management in the context of supporting business objectives," said Matt Webster, chief technology officer of Lumeta.

Key capabilities of the integrated solution include:

Centralized data store that allows you to consolidate and filter all vulnerability scanning data

Demonstrate in real time the true impact of changes on the security profile

Trending and time-series views that reveal vulnerability volumes, severity levels and mitigation progress

A visual and comprehensive picture of holistic risk

Compare network segments to see where threats are most prevalent in order to prioritize resource allocation

"By integrating Lumeta's discovery capabilities as a foundation, the Allgress solution will be able to provide more comprehensive risk management capabilities and give CISOs the true risk impact of each corporate initiative," said Gordon Shevlin, chief executive officer of Allgress.

Availability

The Lumeta connector is available now 'out of the box' within Allgress v5.1; no separate file package is required nor is there additional cost. (Current clients of Allgress simply need to upgrade to v5.1 to take advantage of the integration functionality.)

About Allgress, Inc.

Since 2008, Allgress has been enabling enterprise risk, security, and compliance professionals the ability to efficiently manage their risk posture. By utilizing advanced visualization, automation, streamlined workflows, and the integration of existing data feeds, Allgress reduces the complexity and cost of risk management. Unlike other risk management solutions, Allgress customers derive value in days rather than months. For more information, more visit www.allgress.com or contact us at [email protected] or 925-579-0002.

About Lumeta Corporation

Lumeta's network situational awareness solutions identify and map every IP connected device on a network and discover inbound and outbound leak paths, giving IT management a clear, comprehensive assessment of network vulnerabilities, cyber-threat risks and policy violations from network edge to core. Lumeta provides foundational intelligence required to make decisions impacting security, compliance and availability. Lumeta's products deliver an efficient and cost-effective process to streamline network consolidation (M&A) projects, as well as addresses today's security initiatives associated with BYOD, Mobility, Cloud, Outsourcing, SDN, Access Control and Big Data which increase the complexity of a network and compromise traditional security defenses. Lumeta optimizes other network and security product investments with accurate and fact-based network intelligence. Headquartered in Somerset, New Jersey, Lumeta has operations throughout the world. More information is available at www.lumeta.com

# # #

Lumeta, the Lumeta logo, IPsonar and the IPsonar logo are trademarks and service marks of the Lumeta Corporation. Other product and company names appearing in this document may be trademarks of their respective owners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16632
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
CVE-2021-32073
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
CVE-2021-33033
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
CVE-2021-33034
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
CVE-2019-25044
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.