|By PR Newswire||
|February 24, 2014 07:00 AM EST||
ATLANTA, Feb. 24, 2014 /PRNewswire/ -- RSA CONFERENCE -- Lancope, Inc., a leader in network visibility and security intelligence, will share industry best practices and showcase next-generation technology for combating advanced threats at RSA Conference 2014 taking place this week in San Francisco, CA. Through several speaker presentations, and a strong presence on the show floor, Lancope will educate RSA Conference attendees on how to improve their threat detection, network forensics and incident response efforts to better defend their networks from the vast array of cyber-attacks targeting today's enterprises.
On Wednesday, February 26, Lancope Director of Security Research Tom Cross will join Dr. Larry Ponemon of the Ponemon Institute, as well as panelists from General Motors, Viewpost and The Chertoff Group, to present the findings of a recent Ponemon Institute study on incident response. During the panel, "Why Cyber Incident Response Teams Get No Respect," Cross and the others will share their insights into why many of today's organizations are not as prepared as they should be to fend off advanced attacks, and why CEOs are in the dark about cyber-attacks facing their companies. The panelists will also share best practices for building a strong Computer Security Incident Response Team (CSIRT) with the executive support and respect it needs to succeed.
Lancope CTO Tim "TK" Keanini will also present a session at the RSA Conference on Tuesday, February 25 entitled, "OODA Loop as an Advanced Persistent Defense." During the session, Keanini will illustrate how military strategist John Boyd's OODA Loop (a concept originally applied to combat operations) can be leveraged to improve cyber security and develop an "advanced persistent defense" for thwarting sophisticated, targeted attacks.
"As cyber-attacks continue to escalate and affect a rapidly growing number of organizations, now is the time for security teams and C-level executives alike to reevaluate their network protection strategies," said Keanini. "The conventional reliance on perimeter- and signature-based defenses is no longer working. Lancope prides itself on innovation, and we look forward to sharing our forward-thinking security technologies, research and strategies with our peers at the RSA Conference."
In addition to presenting two sessions, Lancope will also exhibit its new StealthWatch® System Version 6.5 as well as showcase its solutions for retail security breach detection and network forensics at RSA Conference Booth #3634 (North Expo). Lancope and the StealthWatch System will also have a presence at the RSA Conference booths of several partner organizations, including Cisco, Radware, Emulex and Ixia.
Lancope's StealthWatch System Version 6.5 includes an intuitive Web interface and sophisticated alarming capabilities for enhanced usability, security analytics and early threat detection. Specific new features include the following:
- The Operational Network & Security Intelligence (ONSI) dashboard keeps track of the attacker's "kill chain," providing StealthWatch System administrators with awareness of how far attacks are progressing within their networks.
- New "data hoarding" alarms detect attackers who are moving stolen data around within internal networks or preparing it for exfiltration. This functionality is especially beneficial for industries such as government, healthcare and retail that store large quantities of sensitive information.
- StealthWatch Labs Security Updates provide constantly updated, automated security capabilities in the StealthWatch System to detect the latest threats.
- User-defined Threat Criteria enable StealthWatch System administrators to monitor their networks for targeted attack activity based on specific threat intelligence.
"Recent attacks against retail establishments are a reminder that organizations need to be able to detect each step that attackers go through when they break in and steal data," said Lancope's Tom Cross. "Any organization with sensitive information on its internal network should have visibility into what is happening on the network and the ability to detect when data is on the move. The new features in StealthWatch System 6.5 provide visibility into all stages of a targeted attack scenario and shed light on aspects of attacker behavior that other security technologies miss – such as the staging of data for exfiltration."
By leveraging NetFlow, IPFIX and other flow data from existing infrastructure, the StealthWatch System cost-effectively turns the entire network into a sensor grid for detecting anomalous traffic and behaviors. The new 6.5 platform provides an extremely adaptive and responsive system that combines enhanced security intelligence with simplified, streamlined delivery. For additional details on StealthWatch System 6.5, go to: http://www.lancope.com/files/collateral/Lancope-DS-StealthWatch-Whats-New-6.5.pdf.
Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today's top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope's StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope's security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team. For more information, visit www.lancope.com.
©2014 Lancope, Inc. All rights reserved. Lancope, StealthWatch, and other trademarks are registered or unregistered trademarks of Lancope, Inc. All other trademarks are properties of their respective owners.
SOURCE Lancope, Inc.
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Jul. 27, 2016 06:45 PM EDT Reads: 2,048
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Jul. 27, 2016 06:45 PM EDT Reads: 1,136
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation
Jul. 27, 2016 06:00 PM EDT Reads: 1,668
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
Jul. 27, 2016 05:45 PM EDT Reads: 854
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Jul. 27, 2016 04:30 PM EDT Reads: 1,850
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it ...
Jul. 27, 2016 04:30 PM EDT Reads: 184
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Jul. 27, 2016 04:30 PM EDT Reads: 1,614
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
Jul. 27, 2016 04:18 PM EDT Reads: 198
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Jul. 27, 2016 04:15 PM EDT Reads: 1,121
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Jul. 27, 2016 04:00 PM EDT Reads: 1,735
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Jul. 27, 2016 04:00 PM EDT Reads: 1,052
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 27, 2016 04:00 PM EDT Reads: 1,517
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Jul. 27, 2016 03:30 PM EDT Reads: 971
StackIQ has announced the release of Stacki 3.2. Stacki is an easy-to-use Linux server provisioning tool. Stacki 3.2 delivers new capabilities that simplify the automation and integration of site-specific requirements. StackIQ is the commercial entity behind this open source bare metal provisioning tool. Since the release of Stacki in June of 2015, the Stacki core team has been focused on making the Community Edition meet the needs of members of the community, adding features and value, while ...
Jul. 27, 2016 01:45 PM EDT Reads: 438
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
Jul. 27, 2016 01:30 PM EDT Reads: 273