Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/25/2013
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lancope Announced Tighter Integration With Cisco

Lancope will also join the recently announced Cisco Security Technology Partner Ecosystem and Platform Exchange

ORLANDO, June 25, 2013 – Today at Cisco Live, Cisco's annual IT and communications conference, Lancope, Inc., a leader in network visibility and security intelligence, announced tighter integration with several Cisco® infrastructure solutions to provide governments and enterprises with greater performance and flexibility for network and security monitoring. Lancope will also join the recently announced Cisco Security Technology Partner Ecosystem and Platform Exchange Grid (pxGrid) to provide customers with advanced security intelligence.

As Lancope deepens its relationship with Cisco, it is reflected in the StealthWatch®System through enhanced and more customizable integration. Lancope will now offer deeper integration with the Cisco Identity Services Engine (ISE), ASR/ISR and ASA to empower users to more closely guard their infrastructure from potential cyber-attacks and performance issues. As a key component of the Cisco Cyber Threat Defense Solution, StealthWatch helps organizations combat advanced attacks such as APTs, zero-day malware and insider threats.

Collecting and analyzing NetFlow from Cisco infrastructure, StealthWatch fills in the gaps left by conventional security solutions, delivering in-depth visibility into the network interior and advanced security context including virtual, application, identity and mobile awareness. The integration of StealthWatch and Cisco ISE supplies organizations with a complete picture of the potential threat – including the 'who, what, when, where and how' surrounding the incident.

"Lancope has been working closely with Cisco for years to deliver a comprehensive, cost-effective framework for optimum network security and performance," said Mike Potts, president and CEO of Lancope. "As our product platforms evolve, we continue to look for additional opportunities to integrate our solutions and provide enhanced capabilities to joint customers. This latest round of integrations increases the amount and types of valuable network and security data available for users to improve incident response, forensics and compliance."

For Cisco ISE users, events are now sent in real time from ISE to the StealthWatch Management Console (SMC) for more instant awareness of user information and much higher scalability – with the ability to now monitor 250,000 active users. StealthWatch can now also consume NAT information from the Cisco ASR 1000 separately from other flow records to allow for more flexibility and customization. This feature is especially beneficial for Internet Service Providers (ISPs) that need to capture just the NAT information from flow records in order to comply with the Communications Assistance for Law Enforcement Act (CALEA).

StealthWatch also supports the new flow update events from Cisco ASA 8.4(5) NSEL. With this feature, StealthWatch can show interface statistics, track how traffic patterns change over the lifetime of a flow, and break down client versus server bytes to be able to perform actions such as detecting whether data was exfiltrated from the network.

As a Registered Developer of network security products in the Cisco Developer Network, Lancope consumes data from a wide range of devices including Cisco ISE, the Catalyst Series, NGA, ASA, ASR/ISR and Nexus platforms. The new Cisco integrations will be available in July as part of StealthWatch System 6.4. For further details on StealthWatch's network and security monitoring capabilities, go to: http://www.lancope.com/solutions/.

About Lancope

Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today's top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope's StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope's security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team. For more information, visit www.lancope.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-36239
PUBLISHED: 2021-07-29
Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 e...
CVE-2021-37578
PUBLISHED: 2021-07-29
Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malic...
CVE-2021-23416
PUBLISHED: 2021-07-28
This affects all versions of package curly-bracket-parser. When used as a template library, it does not properly sanitize the user input.
CVE-2021-23417
PUBLISHED: 2021-07-28
All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function.
CVE-2021-23415
PUBLISHED: 2021-07-28
This affects the package elFinder.AspNet before 1.1.1. The user-controlled file name is not properly sanitized before it is used to create a file system path.