Welcome!

News Feed Item

21CT Accelerates Security Intelligence Time to Value With LYNXeon v2.29, Providing up to 10X Performance Boost for Security Data Analytics and Visualization

LYNXeon Provides Enhanced Graph Database and Automated Data Connectors to Arm Organizations With Actionable Security Intelligence Through Security Analytics and Visualization

AUSTIN, TX -- (Marketwired) -- 07/18/13 -- 21CT today released version 2.29 of LYNXeon, the company's award-winning data analytics and visualization solution. The update provides several significant advances, including an enhanced graph database that not only increases analytic query performance by up to 10 times but also allows for the analysis and visualization of up to four times more data. In addition, LYNXeon v2.29 includes the new LYNXeon Connect, which automates collection of key security data, providing organizations immediate and actionable security intelligence from the right data.

Arm Your Security Team With Actionable Intelligence

"Organizations are rapidly moving toward a more active network security approach, starting with the amplification of perimeter defenses and event correlation engines through data analytics and visualization," said Robert Williams, chief product officer at 21CT. "The challenge for any organization in making this shift is gaining active security intelligence quickly and moving beyond the simple search and dashboard intelligence provided by security event platforms."

The latest version of LYNXeon amplifies the current network security posture within all organizations and in many cases takes over where traditional perimeter security and event management solutions stop. Today's release provides some key new features, functionality and capabilities, including:

  • Graph database for ultimate analytic performance.
    • Powered by an enhanced graph database, LYNXeon now provides security intelligence up to 10 times faster during analytical queries and can retain four times the amount of data. This combination allows users to conduct faster root cause analysis of events and search for suspicious and malicious traffic patterns over larger sets of historical data.
  • Automated security data collection and fusion.
    • Standard with all deployments of the product, LYNXeon Connect is an enterprise-grade collection framework that automatically connects with key security data, including network connection data, intrusion detection alerts, malware detection alerts, threat feeds and application metadata. LYNXeon Connect works directly with the LYNXeon Connector Library, which supplies standard data connectors for the industry's leading security products.
  • Security intelligence delivered to your inbox.
    • New analytic scheduling and emailing capabilities allow analysts to run analytics at any time and to receive emailed reports detailing the very latest findings. These capabilities are essential for any security team running analytics on a regular basis to be notified of the very latest results in order to quickly take action or be assured that their security posture remains active and resilient.

Illuminate Your Security Intelligence Today

Williams continued, "Using LYNXeon, we see security teams up and running in a matter of minutes, collecting and fusing only the data they need and quickly running analytics to see the unknown unknowns within their network. But almost more gratifying is watching how LYNXeon actually arms these security analysts with a weapon that finally levels the playing field and observing how they use their newly gained security intelligence to go on the hunt."

Built from the ground up as a standardized security analytics and visualization product, LYNXeon can be deployed at any organization and before the end of the day can provide security teams with:

  • Unprecedented observability into the inner workings of the network and the interrelatedness of events.
  • Dramatic reduction of business-critical time to detection and time to mitigation from days and months to a matter of minutes.
  • Ability to identify never-before-seen malicious behavior and build predictive models to detect these attack patterns in the future.
  • Deep visualization of network data combined with graph pattern matching analytics to directly pinpoint attacks, breaches and vulnerabilities.

About 21CT
21CT data analytics and visualization solutions illuminate the intelligence in your data. Using LYNXeon from 21CT, organizations gain the operational and actionable insight needed to harden network security, detect healthcare fraud, document criminal behavior and more. For more information and to find out how to illuminate the intelligence from your data, visit www.21CT.com.

Embedded Video Available

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2360442
Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=2360487

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contacts:
Sarah Murray
Attune Communications
+1 (781) 378-2674
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"Storpool does only block-level storage so we do one thing extremely well. The growth in data is what drives the move to software-defined technologies in general and software-defined storage," explained Boyan Ivanov, CEO and co-founder at StorPool, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Sometimes I write a blog just to formulate and organize a point of view, and I think it’s time that I pull together the bounty of excellent information about Machine Learning. This is a topic with which business leaders must become comfortable, especially tomorrow’s business leaders (tip for my next semester University of San Francisco business students!). Machine learning is a key capability that will help organizations drive optimization and monetization opportunities, and there have been some...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, provided a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to oper...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
ChatOps is an emerging topic that has led to the wide availability of integrations between group chat and various other tools/platforms. Currently, HipChat is an extremely powerful collaboration platform due to the various ChatOps integrations that are available. However, DevOps automation can involve orchestration and complex workflows. In his session at @DevOpsSummit at 20th Cloud Expo, Himanshu Chhetri, CTO at Addteq, will cover practical examples and use cases such as self-provisioning infra...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being software-defined – from our phones and cars through our washing machines to the datacenter. However, there are larger challenges when implementing software defined on a larger scale - when building software defined infrastructure. In his session at 16th Cloud Expo, Boyan Ivanov, CEO of StorPool, provided some practical insights on what, how and why when implementing "software-defined" in the datacent...
Blockchain. A day doesn’t seem to go by without seeing articles and discussions about the technology. According to PwC executive Seamus Cushley, approximately $1.4B has been invested in blockchain just last year. In Gartner’s recent hype cycle for emerging technologies, blockchain is approaching the peak. It is considered by Gartner as one of the ‘Key platform-enabling technologies to track.’ While there is a lot of ‘hype vs reality’ discussions going on, there is no arguing that blockchain is b...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, discussed the b...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations? In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, answered these questions and demonstrated techniques for implementing advanced scheduling. For example, using spot instances and co...
The cloud era has reached the stage where it is no longer a question of whether a company should migrate, but when. Enterprises have embraced the outsourcing of where their various applications are stored and who manages them, saving significant investment along the way. Plus, the cloud has become a defining competitive edge. Companies that fail to successfully adapt risk failure. The media, of course, continues to extol the virtues of the cloud, including how easy it is to get there. Migrating...
The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together ... and maybe even getting some relationship help along the way. And so it goes with container orchestration and automation solutions, which are rapidly emerging as the means to maintain the bliss between rapid container adoption and broad container use among multiple cloud host...
Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.