|By PR Newswire||
|February 24, 2014 07:00 AM EST||
ATLANTA, Feb. 24, 2014 /PRNewswire/ -- RSA CONFERENCE -- Lancope, Inc., a leader in network visibility and security intelligence, will share industry best practices and showcase next-generation technology for combating advanced threats at RSA Conference 2014 taking place this week in San Francisco, CA. Through several speaker presentations, and a strong presence on the show floor, Lancope will educate RSA Conference attendees on how to improve their threat detection, network forensics and incident response efforts to better defend their networks from the vast array of cyber-attacks targeting today's enterprises.
On Wednesday, February 26, Lancope Director of Security Research Tom Cross will join Dr. Larry Ponemon of the Ponemon Institute, as well as panelists from General Motors, Viewpost and The Chertoff Group, to present the findings of a recent Ponemon Institute study on incident response. During the panel, "Why Cyber Incident Response Teams Get No Respect," Cross and the others will share their insights into why many of today's organizations are not as prepared as they should be to fend off advanced attacks, and why CEOs are in the dark about cyber-attacks facing their companies. The panelists will also share best practices for building a strong Computer Security Incident Response Team (CSIRT) with the executive support and respect it needs to succeed.
Lancope CTO Tim "TK" Keanini will also present a session at the RSA Conference on Tuesday, February 25 entitled, "OODA Loop as an Advanced Persistent Defense." During the session, Keanini will illustrate how military strategist John Boyd's OODA Loop (a concept originally applied to combat operations) can be leveraged to improve cyber security and develop an "advanced persistent defense" for thwarting sophisticated, targeted attacks.
"As cyber-attacks continue to escalate and affect a rapidly growing number of organizations, now is the time for security teams and C-level executives alike to reevaluate their network protection strategies," said Keanini. "The conventional reliance on perimeter- and signature-based defenses is no longer working. Lancope prides itself on innovation, and we look forward to sharing our forward-thinking security technologies, research and strategies with our peers at the RSA Conference."
In addition to presenting two sessions, Lancope will also exhibit its new StealthWatch® System Version 6.5 as well as showcase its solutions for retail security breach detection and network forensics at RSA Conference Booth #3634 (North Expo). Lancope and the StealthWatch System will also have a presence at the RSA Conference booths of several partner organizations, including Cisco, Radware, Emulex and Ixia.
Lancope's StealthWatch System Version 6.5 includes an intuitive Web interface and sophisticated alarming capabilities for enhanced usability, security analytics and early threat detection. Specific new features include the following:
- The Operational Network & Security Intelligence (ONSI) dashboard keeps track of the attacker's "kill chain," providing StealthWatch System administrators with awareness of how far attacks are progressing within their networks.
- New "data hoarding" alarms detect attackers who are moving stolen data around within internal networks or preparing it for exfiltration. This functionality is especially beneficial for industries such as government, healthcare and retail that store large quantities of sensitive information.
- StealthWatch Labs Security Updates provide constantly updated, automated security capabilities in the StealthWatch System to detect the latest threats.
- User-defined Threat Criteria enable StealthWatch System administrators to monitor their networks for targeted attack activity based on specific threat intelligence.
"Recent attacks against retail establishments are a reminder that organizations need to be able to detect each step that attackers go through when they break in and steal data," said Lancope's Tom Cross. "Any organization with sensitive information on its internal network should have visibility into what is happening on the network and the ability to detect when data is on the move. The new features in StealthWatch System 6.5 provide visibility into all stages of a targeted attack scenario and shed light on aspects of attacker behavior that other security technologies miss – such as the staging of data for exfiltration."
By leveraging NetFlow, IPFIX and other flow data from existing infrastructure, the StealthWatch System cost-effectively turns the entire network into a sensor grid for detecting anomalous traffic and behaviors. The new 6.5 platform provides an extremely adaptive and responsive system that combines enhanced security intelligence with simplified, streamlined delivery. For additional details on StealthWatch System 6.5, go to: http://www.lancope.com/files/collateral/Lancope-DS-StealthWatch-Whats-New-6.5.pdf.
Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today's top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope's StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope's security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team. For more information, visit www.lancope.com.
©2014 Lancope, Inc. All rights reserved. Lancope, StealthWatch, and other trademarks are registered or unregistered trademarks of Lancope, Inc. All other trademarks are properties of their respective owners.
SOURCE Lancope, Inc.
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his session at 19th Cloud Expo, John Mertic, director of program management for ODPi at The Linux Foundation, will explain why this is, how we can work together as an open data community to increase adoption, and the i...
Sep. 28, 2016 09:15 AM EDT Reads: 1,049
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Sep. 28, 2016 09:15 AM EDT Reads: 3,153
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 28, 2016 09:00 AM EDT Reads: 3,840
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
Sep. 28, 2016 09:00 AM EDT Reads: 2,632
DevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on software to run more traditional business, such as financial firms or high-end manufacturers. Microservices and DevOps have created software development and therefore business speed and agility benefits, but they have also created problems; specifically, they have created software sec...
Sep. 28, 2016 09:00 AM EDT Reads: 1,266
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, showed how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful f...
Sep. 28, 2016 09:00 AM EDT Reads: 2,746
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Sep. 28, 2016 08:45 AM EDT Reads: 1,201
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Sep. 28, 2016 08:45 AM EDT Reads: 1,122
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Sep. 28, 2016 08:45 AM EDT Reads: 2,545
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Sep. 28, 2016 08:30 AM EDT Reads: 1,152
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Sep. 28, 2016 08:30 AM EDT Reads: 1,569
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 28, 2016 08:15 AM EDT Reads: 536
"We have several customers now running private clouds. They're not as large as they should be but it's getting there. The adoption challenge has been pretty simple. Look at the world today of virtualization vs cloud," stated Nara Rajagopalan, CEO of Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Sep. 28, 2016 08:00 AM EDT Reads: 2,430
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Sep. 28, 2016 08:00 AM EDT Reads: 2,055
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Sep. 28, 2016 07:45 AM EDT Reads: 2,267