Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:53 PM
Dark Reading
Dark Reading
Products and Releases

Solera Networks Takes Security Out Of The Box

Rolls out new version of DeepSeer Software

Salt Lake City, Utah -- April 25, 2012 - Solera Networks, the industry's leading advanced Security Intelligence and Analytics provider, today announced a revolutionary new version of its DeepSeer Software solution that helps enterprises of all sizes prepare for the reality of security breaches and attacks. The new software represents the first and only solution to un-box the power of security intelligence and big data analytics technology - eliminating the cost and restrictions of proprietary hardware and storage offerings. With Solera's simple, cost-effective and easy-to-deploy software, any enterprise can now quickly have the answers to difficult post-breach questions like 'who hacked us?', 'how did they do it?', 'what data was compromised?' and 'are we sure it won't happen again?'

Public breaches--including credit card numbers, social security numbers and other personally identifiable information--continue to make headlines as advanced malware and targeted attacks constantly threaten networks and data. As a result, organisations large and small are accepting the inevitability of security breaches. In response, they are focusing on preparedness - regardless of how robust their existing security environment is.

"Enterprises are losing the battle against targeted attacks and, as a result, intellectual property is being stolen and networks are successfully breached every day because these threats go undetected," said Steve Shillingford, President and CEO of Solera Networks. "Organisations are now realizing that their traditional predictive technologies are not fully protecting their systems and data, and are shifting their cybersecurity focus toward breach preparedness. Solera's solutions level the battlefield and hasten this shift by recording and classifying every packet, file, and flow going in and out of the network for complete reconstruction of any attack. Delivering this in an easy-to-deploy software-based solution means that any enterprise can have full visibility, situational awareness and intelligent incident response."

Leading industry analysts have all confirmed the need for investing in advanced solutions that deliver intelligence, analytics and actionable security decision-making--derived from the vast amount of big data traversing the enterprise. However, the reality of expensive and proprietary hardware and storage offerings - along with their high-overhead end-of-life cycles - have kept this next-generation technology out of the reach of many organizations. Now, Solera Networks' easy-to-deploy DeepSee Software solution delivers award-winning Security Intelligence and Analytics technology to any enterprise.

Some of the features and benefits of Solera DeepSee Software include:

· Breach preparedness--prepares any organisation for the inevitability of security breaches by answering the most difficult post-breach questions

· Context-aware security--detects advanced targeted attacks (ATAs) that bypass traditional preventative security controls

· Scalability and ease-of-deployment--breaks the cycle of security obsolescence with a simple and flexible software licensing model

· Lower TCO--puts the cap on capital expenses with the only software-based solution of its kind available on leading hardware platforms

· Flexibility and performance--leverages the latest in multi-core compute power and storage innovation to stay ahead of today's increasing network speeds

"New threats are bypassing or simply overwhelming old security monitoring tools," said Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group. "Given the scale and complexity of security management today, the existing portfolio of security intelligence tools is becoming inadequate, but CISOs don't want to repeat past mistakes by buying additional tactical solutions. The next-generation of security intelligence tools must address everything missing today by offering tight integration, big data analytics intelligence, multi-terabyte scale, and out-of-the-box value."

The initial release of Solera's new version of DeepSee Software will support leading platforms, including Dell, HP and IBM--enabling enterprises large and small to leverage cost-effective, industry-leading hardware and compute power.

Solera Networks will be showcasing its DeepSee Software and conducting meetings with CEO Steve Shillingford, CTO Joe Levy and VP of Marketing John Vecchi at Infosecurity Europe 2012 at stand G77 in the US Pavilion. For more detailed information about Solera's Security Intelligence and Analytics solutions, visit: www.soleranetworks.com.

About Solera Networks See everything. Know everything.(tm)

Solera Networks is the industry's leading advanced Security Intelligence and Analytics provider. Its award-winning DeepSeer platform is powered by next-generation deep-packet inspection and indexing technologies, network security analytics and intelligence capabilities. Global 2000 enterprises, cloud service providers and government agencies rely on Solera to see everything and know everything on their network--allowing them to gain total visibility and situational awareness, respond quickly and intelligently to advanced threats and malware, protect critical information assets, minimize exposure and loss and reduce business risk. For more information, please visit www.soleranetworks.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
The Data-Centric Path to Zero Trust
Altaz Valani, Director of Insights Research, Security Compass,  1/13/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).