Click here to close now.




















Welcome!

News Feed Item

21CT Joins Sourcefire Technical Partner Program

Using 21CT's LYNXeon, Sourcefire Users Harness Unified Security Analytics and Network Visualization to Amplify Perimeter Defenses and Detect Malicious Behavior Hidden Within Disparate Network Data

AUSTIN, TX -- (Marketwired) -- 02/18/14 -- Progressive organizations have begun to implement Next-Gen Intrusion Prevention Systems and other advanced perimeter solutions to better protect themselves from today's dynamic and destructive cybersecurity threats. Sourcefire, now part of Cisco, a global leader in this market, provides solutions that deliver "Integrated Intelligence" to provide not only protection from an attack, but also actionable information during and even after an incident. LYNXeon, from 21CT, is a network behavior analysis and visualization solution that amplifies the protection of Sourcefire solutions, enabling security analysts to expose even more malicious behavior currently hidden across the disparate troves of network data. Today 21CT announced that the company is now a part of Sourcefire's Technology Partner Program.

RSA Conference attendees can use LYNXeon themselves, and potentially win a PS4, while on the show floor by visiting booth 2420 or registering here.

"Security analysts know that there is a big difference between security information and security intelligence," said Mike Hamilton, 21CT director of product marketing. "Data on its own is just information, but the ability to link and fuse data sources, visualize the behaviors and relationships between them, and run analytics to detect undiscovered patterns turns plain old security data into something much more powerful. Sourcefire understands this well with its ability to provide organizations with Integrated Intelligence, and being part of their Technical Alliance program lets 21CT show these companies how unified security analytics and network behavior visualization can provide even more actionable intelligence."

LYNXeon automatically fuses Sourcefire data with other available network data, visualizes it for security professionals, and conducts relationship and pattern recognition analytics to detect previously hidden malicious behavior. Using LYNXeon in combination with Sourcefire enables organizations to:

  • Visualize network behavior and automatically pinpoint malicious conduct.
  • Shorten time required to remediate malignant and noncompliant machines.
  • Empower security analysts to start finding threats today using the data they already have.

The LYNXeon Sourcefire Connector is built to automatically use the high-fidelity data generated from the Sourcefire solution and fuse it together with other critical network security data sources, including other IPS/IDS devices, flow, additional malware detection solutions, DNS logs, monitoring systems, threat feeds, PCAPs and more. Organizations can then establish and expose malicious behaviors and patterns across this data.

Learn more about using LYNXeon network behavior analysis and visualization and register for a personalized demo.

About 21CT
Using LYNXeon from 21CT, organizations rapidly fuse enriched and disparate data; analyze and visualize it to find previously undetectable patterns; and gain operational insight to fight fraud, cyber attacks and criminal behavior. For more information and to find out how investigative analytics and pattern detection can secure your world, visit www.21ct.com.

Media Contacts:

Julie Crotty
Attune Communications
978-877-0053
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
SYS-CON Events announced today that the "Second Containers & Microservices Expo" will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 17th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships at Com...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Scrum Alliance has announced the release of its 2015 State of Scrum Report. Almost 5,000 individuals and companies worldwide participated in this year's survey. Most organizations in the market today are still leading and managing under an Industrial Age model. Not only is the speed of change growing exponentially, Agile and Scrum frameworks are showing companies how to draw on the full talents and capabilities of those doing the work in order to continue innovating for success.
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at @DevOpsSummit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, presented a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mocku...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
SYS-CON Events announced today that VividCortex, the monitoring solution for the modern data system, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The database is the heart of most applications, but it’s also the part that’s hardest to scale, monitor, and optimize even as it’s growing 50% year over year. VividCortex is the first unified suite of database monitoring tools specifically desi...
Graylog, Inc., has added the capability to collect, centralize and analyze application container logs from within Docker. The Graylog logging driver for Docker addresses the challenges of extracting intelligence from within Docker containers, where most workloads are dynamic and log data is not persisted or stored. Using Graylog, DevOps and IT Ops teams can pinpoint the root cause of problems to deliver new applications faster and minimize downtime.
As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being software-defined – from our phones and cars through our washing machines to the datacenter. However, there are larger challenges when implementing software defined on a larger scale - when building software defined infrastructure. In his session at 16th Cloud Expo, Boyan Ivanov, CEO of StorPool, provided some practical insights on what, how and why when implementing "software-defined" in the datacent...
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.