IPsonar' discovers the comprehensive network perimeter and clearly demarcates between the “known” and “unknown” in your network. With its patented leak detection and network discovery capabilities, IPsonar detects, identifies, maps and analyzes every device on the network, outlining a clear picture of the first line of defense in network security. By verifying the behavior of firewalls and other network devices, IPsonar identifies gaps in perimeter defenses – or “leaks” – that compromise network security and put the enterprise at risk.
“Because of increased enterprise threats such as APTs and rogue insiders, as well as smarter malware, we dramatically improved IPsonar’s detection capabilities in our latest release by incorporating Enhanced Perimeter Discovery”, said Michael Markulec, CEO of Lumeta Corporation. “By providing real-time visibility into the edge of the Enterprise network and identifying potentially dangerous activity, IPsonar provides greater security and assurance that potential leaks are stopped before they can be exploited.”
As the scope of the network perimeter continues to increase through mobile devices, VPN, and other technologies, traditional methods for identifying the perimeter of the network are no longer enough because they will be blocked or thwarted by more sophisticated users and devices. Enhanced Perimeter Discovery (EPD) uses a targeted approach to identify devices on the network that have the ability to pass traffic out of the enterprise and into unauthorized or even dangerous networks. Often these devices are not traditional routers, but enterprise servers, workstations and other systems that are targeted for exploitation by attackers and malware. When these systems forward traffic to unknown, unauthorized or untrusted networks, IPsonar’s EPD immediately detects and alerts on the complete context of the network conversation, including details on the device or host and the addresses and networks connected to, enabling an unprecedented view of potential holes in your network perimeter.
Enhanced Perimeter Discovery enables Government and Enterprise customers to:
Discover devices and hosts on the network that are not compliant with network traffic policy Determine which devices are serving as egress points to unknown, unauthorized or untrusted networks Identify network vulnerabilities that put the organization at risk
By proving network and security personnel with real-time information to remediate potentially damaging network conversations, IPsonar gives customers the tools they need to discover, document, and defend the TRUE network perimeter.
Additional new features and improvements available in IPsonar 5.4 include:
Data Push. IPsonar reports now appear on the reporting interface menu as they are completed on the server – there is no need to refresh the browser. Additionally, IPsonar now provides automated, real-time and dynamic updates for multiple users, including user-created views and dashboards as well as custom reports. Enhanced Visualization. IPsonar visually maps the complete context of connections, allows users to easily focus on specific areas of interest and drill-down to investigate specific network segments. The node menu has also been enhanced to display the details of any node, enabling quicker access to relevant data. Supplemental Discovery. IPsonar allows IP addresses discovered during Layer 2 Discovery to be fed back into other components of the product, including Host Discovery, Device Discovery, and Leak Discovery, enabling more thorough investigative analysis.
For more information visit: www.lumeta.com or follow us on Twitter @lumeta.
About Lumeta Corporation
Lumeta empowers large enterprise and government agencies with global network visibility, allowing them to understand how changes to their networks affects security, availability, and compliance.
Lumeta’s IPsonar is the industry’s only network discovery and visibility solution that discovers and maps every asset on a network, including assets not currently under management. This capability enables IT professionals to analyze the connectivity between assets and networks, uncover risk patterns, and automate the enforcement of network policies.
With this level of network situational awareness, IT organizations can harden security, improve business continuity, and deploy new services without impacting its ability to deliver existing services.