Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/25/2013
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lancope Announced Tighter Integration With Cisco

Lancope will also join the recently announced Cisco Security Technology Partner Ecosystem and Platform Exchange

ORLANDO, June 25, 2013 – Today at Cisco Live, Cisco's annual IT and communications conference, Lancope, Inc., a leader in network visibility and security intelligence, announced tighter integration with several Cisco® infrastructure solutions to provide governments and enterprises with greater performance and flexibility for network and security monitoring. Lancope will also join the recently announced Cisco Security Technology Partner Ecosystem and Platform Exchange Grid (pxGrid) to provide customers with advanced security intelligence.

As Lancope deepens its relationship with Cisco, it is reflected in the StealthWatch®System through enhanced and more customizable integration. Lancope will now offer deeper integration with the Cisco Identity Services Engine (ISE), ASR/ISR and ASA to empower users to more closely guard their infrastructure from potential cyber-attacks and performance issues. As a key component of the Cisco Cyber Threat Defense Solution, StealthWatch helps organizations combat advanced attacks such as APTs, zero-day malware and insider threats.

Collecting and analyzing NetFlow from Cisco infrastructure, StealthWatch fills in the gaps left by conventional security solutions, delivering in-depth visibility into the network interior and advanced security context including virtual, application, identity and mobile awareness. The integration of StealthWatch and Cisco ISE supplies organizations with a complete picture of the potential threat – including the 'who, what, when, where and how' surrounding the incident.

"Lancope has been working closely with Cisco for years to deliver a comprehensive, cost-effective framework for optimum network security and performance," said Mike Potts, president and CEO of Lancope. "As our product platforms evolve, we continue to look for additional opportunities to integrate our solutions and provide enhanced capabilities to joint customers. This latest round of integrations increases the amount and types of valuable network and security data available for users to improve incident response, forensics and compliance."

For Cisco ISE users, events are now sent in real time from ISE to the StealthWatch Management Console (SMC) for more instant awareness of user information and much higher scalability – with the ability to now monitor 250,000 active users. StealthWatch can now also consume NAT information from the Cisco ASR 1000 separately from other flow records to allow for more flexibility and customization. This feature is especially beneficial for Internet Service Providers (ISPs) that need to capture just the NAT information from flow records in order to comply with the Communications Assistance for Law Enforcement Act (CALEA).

StealthWatch also supports the new flow update events from Cisco ASA 8.4(5) NSEL. With this feature, StealthWatch can show interface statistics, track how traffic patterns change over the lifetime of a flow, and break down client versus server bytes to be able to perform actions such as detecting whether data was exfiltrated from the network.

As a Registered Developer of network security products in the Cisco Developer Network, Lancope consumes data from a wide range of devices including Cisco ISE, the Catalyst Series, NGA, ASA, ASR/ISR and Nexus platforms. The new Cisco integrations will be available in July as part of StealthWatch System 6.4. For further details on StealthWatch's network and security monitoring capabilities, go to: http://www.lancope.com/solutions/.

About Lancope

Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today's top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope's StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope's security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team. For more information, visit www.lancope.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/13/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14300
PUBLISHED: 2020-07-13
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
CVE-2020-14298
PUBLISHED: 2020-07-13
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
CVE-2020-15050
PUBLISHED: 2020-07-13
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CVE-2020-10987
PUBLISHED: 2020-07-13
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CVE-2020-10988
PUBLISHED: 2020-07-13
A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version 15.03.05.19 allows unauthenticated remote attackers to start a telnetd service on the device.