News Feed Item

21CT Joins Sourcefire Technical Partner Program

Using 21CT's LYNXeon, Sourcefire Users Harness Unified Security Analytics and Network Visualization to Amplify Perimeter Defenses and Detect Malicious Behavior Hidden Within Disparate Network Data

AUSTIN, TX -- (Marketwired) -- 02/18/14 -- Progressive organizations have begun to implement Next-Gen Intrusion Prevention Systems and other advanced perimeter solutions to better protect themselves from today's dynamic and destructive cybersecurity threats. Sourcefire, now part of Cisco, a global leader in this market, provides solutions that deliver "Integrated Intelligence" to provide not only protection from an attack, but also actionable information during and even after an incident. LYNXeon, from 21CT, is a network behavior analysis and visualization solution that amplifies the protection of Sourcefire solutions, enabling security analysts to expose even more malicious behavior currently hidden across the disparate troves of network data. Today 21CT announced that the company is now a part of Sourcefire's Technology Partner Program.

RSA Conference attendees can use LYNXeon themselves, and potentially win a PS4, while on the show floor by visiting booth 2420 or registering here.

"Security analysts know that there is a big difference between security information and security intelligence," said Mike Hamilton, 21CT director of product marketing. "Data on its own is just information, but the ability to link and fuse data sources, visualize the behaviors and relationships between them, and run analytics to detect undiscovered patterns turns plain old security data into something much more powerful. Sourcefire understands this well with its ability to provide organizations with Integrated Intelligence, and being part of their Technical Alliance program lets 21CT show these companies how unified security analytics and network behavior visualization can provide even more actionable intelligence."

LYNXeon automatically fuses Sourcefire data with other available network data, visualizes it for security professionals, and conducts relationship and pattern recognition analytics to detect previously hidden malicious behavior. Using LYNXeon in combination with Sourcefire enables organizations to:

  • Visualize network behavior and automatically pinpoint malicious conduct.
  • Shorten time required to remediate malignant and noncompliant machines.
  • Empower security analysts to start finding threats today using the data they already have.

The LYNXeon Sourcefire Connector is built to automatically use the high-fidelity data generated from the Sourcefire solution and fuse it together with other critical network security data sources, including other IPS/IDS devices, flow, additional malware detection solutions, DNS logs, monitoring systems, threat feeds, PCAPs and more. Organizations can then establish and expose malicious behaviors and patterns across this data.

Learn more about using LYNXeon network behavior analysis and visualization and register for a personalized demo.

About 21CT
Using LYNXeon from 21CT, organizations rapidly fuse enriched and disparate data; analyze and visualize it to find previously undetectable patterns; and gain operational insight to fight fraud, cyber attacks and criminal behavior. For more information and to find out how investigative analytics and pattern detection can secure your world, visit www.21ct.com.

Media Contacts:

Julie Crotty
Attune Communications
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability and development velocity challenges. In his session at 21st Cloud Expo, Ryland Degnan, a Senior Software Engineer on the Netflix Edge Platform team, will discuss how by leveraging a reactive stream-based protocol,...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
Digital transformation is about embracing digital technologies into a company's culture to better connect with its customers, automate processes, create better tools, enter new markets, etc. Such a transformation requires continuous orchestration across teams and an environment based on open collaboration and daily experiments. In his session at 21st Cloud Expo, Alex Casalboni, Technical (Cloud) Evangelist at Cloud Academy, explored and discussed the most urgent unsolved challenges to achieve fu...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
DXWorldEXPO LLC announced today that "Miami Blockchain Event by FinTechEXPO" has announced that its Call for Papers is now open. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expe...
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...