Click here to close now.




















Welcome!

News Feed Item

21CT Accelerates Security Intelligence Time to Value With LYNXeon v2.29, Providing up to 10X Performance Boost for Security Data Analytics and Visualization

LYNXeon Provides Enhanced Graph Database and Automated Data Connectors to Arm Organizations With Actionable Security Intelligence Through Security Analytics and Visualization

AUSTIN, TX -- (Marketwired) -- 07/18/13 -- 21CT today released version 2.29 of LYNXeon, the company's award-winning data analytics and visualization solution. The update provides several significant advances, including an enhanced graph database that not only increases analytic query performance by up to 10 times but also allows for the analysis and visualization of up to four times more data. In addition, LYNXeon v2.29 includes the new LYNXeon Connect, which automates collection of key security data, providing organizations immediate and actionable security intelligence from the right data.

Arm Your Security Team With Actionable Intelligence

"Organizations are rapidly moving toward a more active network security approach, starting with the amplification of perimeter defenses and event correlation engines through data analytics and visualization," said Robert Williams, chief product officer at 21CT. "The challenge for any organization in making this shift is gaining active security intelligence quickly and moving beyond the simple search and dashboard intelligence provided by security event platforms."

The latest version of LYNXeon amplifies the current network security posture within all organizations and in many cases takes over where traditional perimeter security and event management solutions stop. Today's release provides some key new features, functionality and capabilities, including:

  • Graph database for ultimate analytic performance.
    • Powered by an enhanced graph database, LYNXeon now provides security intelligence up to 10 times faster during analytical queries and can retain four times the amount of data. This combination allows users to conduct faster root cause analysis of events and search for suspicious and malicious traffic patterns over larger sets of historical data.
  • Automated security data collection and fusion.
    • Standard with all deployments of the product, LYNXeon Connect is an enterprise-grade collection framework that automatically connects with key security data, including network connection data, intrusion detection alerts, malware detection alerts, threat feeds and application metadata. LYNXeon Connect works directly with the LYNXeon Connector Library, which supplies standard data connectors for the industry's leading security products.
  • Security intelligence delivered to your inbox.
    • New analytic scheduling and emailing capabilities allow analysts to run analytics at any time and to receive emailed reports detailing the very latest findings. These capabilities are essential for any security team running analytics on a regular basis to be notified of the very latest results in order to quickly take action or be assured that their security posture remains active and resilient.

Illuminate Your Security Intelligence Today

Williams continued, "Using LYNXeon, we see security teams up and running in a matter of minutes, collecting and fusing only the data they need and quickly running analytics to see the unknown unknowns within their network. But almost more gratifying is watching how LYNXeon actually arms these security analysts with a weapon that finally levels the playing field and observing how they use their newly gained security intelligence to go on the hunt."

Built from the ground up as a standardized security analytics and visualization product, LYNXeon can be deployed at any organization and before the end of the day can provide security teams with:

  • Unprecedented observability into the inner workings of the network and the interrelatedness of events.
  • Dramatic reduction of business-critical time to detection and time to mitigation from days and months to a matter of minutes.
  • Ability to identify never-before-seen malicious behavior and build predictive models to detect these attack patterns in the future.
  • Deep visualization of network data combined with graph pattern matching analytics to directly pinpoint attacks, breaches and vulnerabilities.

About 21CT
21CT data analytics and visualization solutions illuminate the intelligence in your data. Using LYNXeon from 21CT, organizations gain the operational and actionable insight needed to harden network security, detect healthcare fraud, document criminal behavior and more. For more information and to find out how to illuminate the intelligence from your data, visit www.21CT.com.

Embedded Video Available

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2360442
Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=2360487

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contacts:
Sarah Murray
Attune Communications
+1 (781) 378-2674
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Chuck Piluso presented a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Te...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
For IoT to grow as quickly as analyst firms’ project, a lot is going to fall on developers to quickly bring applications to market. But the lack of a standard development platform threatens to slow growth and make application development more time consuming and costly, much like we’ve seen in the mobile space. In his session at @ThingsExpo, Mike Weiner, Product Manager of the Omega DevCloud with KORE Telematics Inc., discussed the evolving requirements for developers as IoT matures and conducte...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.