Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:00 PM
Dark Reading
Dark Reading
Products and Releases

Lancope Announced Tighter Integration With Cisco

Lancope will also join the recently announced Cisco Security Technology Partner Ecosystem and Platform Exchange

ORLANDO, June 25, 2013 – Today at Cisco Live, Cisco's annual IT and communications conference, Lancope, Inc., a leader in network visibility and security intelligence, announced tighter integration with several Cisco® infrastructure solutions to provide governments and enterprises with greater performance and flexibility for network and security monitoring. Lancope will also join the recently announced Cisco Security Technology Partner Ecosystem and Platform Exchange Grid (pxGrid) to provide customers with advanced security intelligence.

As Lancope deepens its relationship with Cisco, it is reflected in the StealthWatch®System through enhanced and more customizable integration. Lancope will now offer deeper integration with the Cisco Identity Services Engine (ISE), ASR/ISR and ASA to empower users to more closely guard their infrastructure from potential cyber-attacks and performance issues. As a key component of the Cisco Cyber Threat Defense Solution, StealthWatch helps organizations combat advanced attacks such as APTs, zero-day malware and insider threats.

Collecting and analyzing NetFlow from Cisco infrastructure, StealthWatch fills in the gaps left by conventional security solutions, delivering in-depth visibility into the network interior and advanced security context including virtual, application, identity and mobile awareness. The integration of StealthWatch and Cisco ISE supplies organizations with a complete picture of the potential threat – including the 'who, what, when, where and how' surrounding the incident.

"Lancope has been working closely with Cisco for years to deliver a comprehensive, cost-effective framework for optimum network security and performance," said Mike Potts, president and CEO of Lancope. "As our product platforms evolve, we continue to look for additional opportunities to integrate our solutions and provide enhanced capabilities to joint customers. This latest round of integrations increases the amount and types of valuable network and security data available for users to improve incident response, forensics and compliance."

For Cisco ISE users, events are now sent in real time from ISE to the StealthWatch Management Console (SMC) for more instant awareness of user information and much higher scalability – with the ability to now monitor 250,000 active users. StealthWatch can now also consume NAT information from the Cisco ASR 1000 separately from other flow records to allow for more flexibility and customization. This feature is especially beneficial for Internet Service Providers (ISPs) that need to capture just the NAT information from flow records in order to comply with the Communications Assistance for Law Enforcement Act (CALEA).

StealthWatch also supports the new flow update events from Cisco ASA 8.4(5) NSEL. With this feature, StealthWatch can show interface statistics, track how traffic patterns change over the lifetime of a flow, and break down client versus server bytes to be able to perform actions such as detecting whether data was exfiltrated from the network.

As a Registered Developer of network security products in the Cisco Developer Network, Lancope consumes data from a wide range of devices including Cisco ISE, the Catalyst Series, NGA, ASA, ASR/ISR and Nexus platforms. The new Cisco integrations will be available in July as part of StealthWatch System 6.4. For further details on StealthWatch's network and security monitoring capabilities, go to: http://www.lancope.com/solutions/.

About Lancope

Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today's top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope's StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope's security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team. For more information, visit www.lancope.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-22
nsGreen.dll in Naver Vaccine 2.1.4 allows remote attackers to overwrite arbitary files via directory traversal sequences in a filename within nsz archive.
PUBLISHED: 2019-11-22
A cross-site request forgery (CSRF) vulnerability in the Activity module 6.x-1.x for Drupal.
PUBLISHED: 2019-11-21
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. The UriSigner was subject to timing attacks. This is related to symfony/http-kernel.
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. T...