Welcome!

News Feed Item

21CT Accelerates Security Intelligence Time to Value With LYNXeon v2.29, Providing up to 10X Performance Boost for Security Data Analytics and Visualization

LYNXeon Provides Enhanced Graph Database and Automated Data Connectors to Arm Organizations With Actionable Security Intelligence Through Security Analytics and Visualization

AUSTIN, TX -- (Marketwired) -- 07/18/13 -- 21CT today released version 2.29 of LYNXeon, the company's award-winning data analytics and visualization solution. The update provides several significant advances, including an enhanced graph database that not only increases analytic query performance by up to 10 times but also allows for the analysis and visualization of up to four times more data. In addition, LYNXeon v2.29 includes the new LYNXeon Connect, which automates collection of key security data, providing organizations immediate and actionable security intelligence from the right data.

Arm Your Security Team With Actionable Intelligence

"Organizations are rapidly moving toward a more active network security approach, starting with the amplification of perimeter defenses and event correlation engines through data analytics and visualization," said Robert Williams, chief product officer at 21CT. "The challenge for any organization in making this shift is gaining active security intelligence quickly and moving beyond the simple search and dashboard intelligence provided by security event platforms."

The latest version of LYNXeon amplifies the current network security posture within all organizations and in many cases takes over where traditional perimeter security and event management solutions stop. Today's release provides some key new features, functionality and capabilities, including:

  • Graph database for ultimate analytic performance.
    • Powered by an enhanced graph database, LYNXeon now provides security intelligence up to 10 times faster during analytical queries and can retain four times the amount of data. This combination allows users to conduct faster root cause analysis of events and search for suspicious and malicious traffic patterns over larger sets of historical data.
  • Automated security data collection and fusion.
    • Standard with all deployments of the product, LYNXeon Connect is an enterprise-grade collection framework that automatically connects with key security data, including network connection data, intrusion detection alerts, malware detection alerts, threat feeds and application metadata. LYNXeon Connect works directly with the LYNXeon Connector Library, which supplies standard data connectors for the industry's leading security products.
  • Security intelligence delivered to your inbox.
    • New analytic scheduling and emailing capabilities allow analysts to run analytics at any time and to receive emailed reports detailing the very latest findings. These capabilities are essential for any security team running analytics on a regular basis to be notified of the very latest results in order to quickly take action or be assured that their security posture remains active and resilient.

Illuminate Your Security Intelligence Today

Williams continued, "Using LYNXeon, we see security teams up and running in a matter of minutes, collecting and fusing only the data they need and quickly running analytics to see the unknown unknowns within their network. But almost more gratifying is watching how LYNXeon actually arms these security analysts with a weapon that finally levels the playing field and observing how they use their newly gained security intelligence to go on the hunt."

Built from the ground up as a standardized security analytics and visualization product, LYNXeon can be deployed at any organization and before the end of the day can provide security teams with:

  • Unprecedented observability into the inner workings of the network and the interrelatedness of events.
  • Dramatic reduction of business-critical time to detection and time to mitigation from days and months to a matter of minutes.
  • Ability to identify never-before-seen malicious behavior and build predictive models to detect these attack patterns in the future.
  • Deep visualization of network data combined with graph pattern matching analytics to directly pinpoint attacks, breaches and vulnerabilities.

About 21CT
21CT data analytics and visualization solutions illuminate the intelligence in your data. Using LYNXeon from 21CT, organizations gain the operational and actionable insight needed to harden network security, detect healthcare fraud, document criminal behavior and more. For more information and to find out how to illuminate the intelligence from your data, visit www.21CT.com.

Embedded Video Available

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2360442
Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=2360487

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contacts:
Sarah Murray
Attune Communications
+1 (781) 378-2674
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha...
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, will discuss how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved effi...
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
Data-as-a-Service is the complete package for the transformation of raw data into meaningful data assets and the delivery of those data assets. In her session at 18th Cloud Expo, Lakshmi Randall, an industry expert, analyst and strategist, will address: What is DaaS (Data-as-a-Service)? Challenges addressed by DaaS Vendors that are enabling DaaS Architecture options for DaaS
One of the bewildering things about DevOps is integrating the massive toolchain including the dozens of new tools that seem to crop up every year. Part of DevOps is Continuous Delivery and having a complex toolchain can add additional integration and setup to your developer environment. In his session at @DevOpsSummit at 18th Cloud Expo, Miko Matsumura, Chief Marketing Officer of Gradle Inc., will discuss which tools to use in a developer stack, how to provision the toolchain to minimize onboa...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection.
The principles behind DevOps are not new - for decades people have been automating system administration and decreasing the time to deploy apps and perform other management tasks. However, only recently did we see the tools and the will necessary to share the benefits and power of automation with a wider circle of people. In his session at DevOps Summit, Bernard Sanders, Chief Technology Officer at CloudBolt Software, explored the latest tools including Puppet, Chef, Docker, and CMPs needed to...
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes...
Father business cycles and digital consumers are forcing enterprises to respond faster to customer needs and competitive demands. Successful integration of DevOps and Agile development will be key for business success in today’s digital economy. In his session at DevOps Summit, Pradeep Prabhu, Co-Founder & CEO of Cloudmunch, covered the critical practices that enterprises should consider to seamlessly integrate Agile and DevOps processes, barriers to implementing this in the enterprise, and pr...
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
Advances in technology and ubiquitous connectivity have made the utilization of a dispersed workforce more common. Whether that remote team is located across the street or country, management styles/ approaches will have to be adjusted to accommodate this new dynamic. In his session at 17th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., focused on the challenges of managing remote teams, providing real-world examples that demonstrate what works and what do...
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
In most cases, it is convenient to have some human interaction with a web (micro-)service, no matter how small it is. A traditional approach would be to create an HTTP interface, where user requests will be dispatched and HTML/CSS pages must be served. This approach is indeed very traditional for a web site, but not really convenient for a web service, which is not intended to be good looking, 24x7 up and running and UX-optimized. Instead, talking to a web service in a chat-bot mode would be muc...