Welcome!

News Feed Item

21CT Accelerates Security Intelligence Time to Value With LYNXeon v2.29, Providing up to 10X Performance Boost for Security Data Analytics and Visualization

LYNXeon Provides Enhanced Graph Database and Automated Data Connectors to Arm Organizations With Actionable Security Intelligence Through Security Analytics and Visualization

AUSTIN, TX -- (Marketwired) -- 07/18/13 -- 21CT today released version 2.29 of LYNXeon, the company's award-winning data analytics and visualization solution. The update provides several significant advances, including an enhanced graph database that not only increases analytic query performance by up to 10 times but also allows for the analysis and visualization of up to four times more data. In addition, LYNXeon v2.29 includes the new LYNXeon Connect, which automates collection of key security data, providing organizations immediate and actionable security intelligence from the right data.

Arm Your Security Team With Actionable Intelligence

"Organizations are rapidly moving toward a more active network security approach, starting with the amplification of perimeter defenses and event correlation engines through data analytics and visualization," said Robert Williams, chief product officer at 21CT. "The challenge for any organization in making this shift is gaining active security intelligence quickly and moving beyond the simple search and dashboard intelligence provided by security event platforms."

The latest version of LYNXeon amplifies the current network security posture within all organizations and in many cases takes over where traditional perimeter security and event management solutions stop. Today's release provides some key new features, functionality and capabilities, including:

  • Graph database for ultimate analytic performance.
    • Powered by an enhanced graph database, LYNXeon now provides security intelligence up to 10 times faster during analytical queries and can retain four times the amount of data. This combination allows users to conduct faster root cause analysis of events and search for suspicious and malicious traffic patterns over larger sets of historical data.
  • Automated security data collection and fusion.
    • Standard with all deployments of the product, LYNXeon Connect is an enterprise-grade collection framework that automatically connects with key security data, including network connection data, intrusion detection alerts, malware detection alerts, threat feeds and application metadata. LYNXeon Connect works directly with the LYNXeon Connector Library, which supplies standard data connectors for the industry's leading security products.
  • Security intelligence delivered to your inbox.
    • New analytic scheduling and emailing capabilities allow analysts to run analytics at any time and to receive emailed reports detailing the very latest findings. These capabilities are essential for any security team running analytics on a regular basis to be notified of the very latest results in order to quickly take action or be assured that their security posture remains active and resilient.

Illuminate Your Security Intelligence Today

Williams continued, "Using LYNXeon, we see security teams up and running in a matter of minutes, collecting and fusing only the data they need and quickly running analytics to see the unknown unknowns within their network. But almost more gratifying is watching how LYNXeon actually arms these security analysts with a weapon that finally levels the playing field and observing how they use their newly gained security intelligence to go on the hunt."

Built from the ground up as a standardized security analytics and visualization product, LYNXeon can be deployed at any organization and before the end of the day can provide security teams with:

  • Unprecedented observability into the inner workings of the network and the interrelatedness of events.
  • Dramatic reduction of business-critical time to detection and time to mitigation from days and months to a matter of minutes.
  • Ability to identify never-before-seen malicious behavior and build predictive models to detect these attack patterns in the future.
  • Deep visualization of network data combined with graph pattern matching analytics to directly pinpoint attacks, breaches and vulnerabilities.

About 21CT
21CT data analytics and visualization solutions illuminate the intelligence in your data. Using LYNXeon from 21CT, organizations gain the operational and actionable insight needed to harden network security, detect healthcare fraud, document criminal behavior and more. For more information and to find out how to illuminate the intelligence from your data, visit www.21CT.com.

Embedded Video Available

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2360442
Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=2360487

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contacts:
Sarah Murray
Attune Communications
+1 (781) 378-2674
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.