Welcome!

Related Topics: Cloud Security, Java IoT, Microservices Expo, Agile Computing

Cloud Security: Blog Post

Lancope’s StealthWatch Turns Enterprise Networks into Secure Sensor Grid

Interview with Mike Potts, CEO of Lancope

Thanks for taking the time to answer my questions. Please tell us, what is Lancope all about and what do you do?

Mike Potts, CEO of Lancope: Good to be with you today....

Lancope's mission is to constantly deliver to our customers an overwhelming advantage in cybersecurity defense. We do this by turning the network into an online sensor grid providing superior network visibility and security intelligence.

With the perimeter security model 1.0 having become very porous and unreliable for stopping new age attacks (attacks without signatures, advanced persistent threats, and the evolving insider threat), a new set of security 2.0 requirements has emerged.

Through our more than 200 security algorithms, we are able to digest metadata known as NetFlow coming off of switches, routers, and various perimeter security devices to present an actionable, continuous macro level view of what has seeped through the perimeter.  Using many of the same data sources, we are also able to get a complete view of intra-network activity to identify and shut down malicious actions long before a widespread security breach could occur.

What's new at Lancope? Pls be specific with model description etc.!)

Potts: We just released StealthWatch version 6.5 and our FlowSensor 4000.  This combined offering enables us to deliver massive scalability to the largest service providers and enterprise data centers while also offering a more intuitive interface to enable a broader group of users.

The StealthWatch FlowSensor 4000 is able to handle up to 20 gigabits of sustained bandwidth to ensure our customers are able to capture the metadata required to get a complete macro view of their environment.  This is nearly a 4x increase from our previous capability.

In StealthWatch 6.5, our product managers and engineers have delivered a much more intuitive product for ease of use, with improved dashboards and enhanced security intelligence capabilities to provide actionable information for faster detection and removal of threats.   Through our StealthWatch Labs security research team, we have also provided additional protection from major threats by delivering behavioral security algorithms to Lancope customers outside of their product update cycles, as well as  the ability to create their own custom security event alarms.

Who is your target audience and how do you intend to reach them? What is the biggest challenge you face right now in telling your story and winning over new clients?

Potts: We target chief information security officers and/or their security professionals throughout Enterprise 2000 corporations, governments, healthcare and higher education facilities worldwide.

With a lot of noise in the market and many companies claiming to do similar things, it remains an ongoing challenge for all of us in the security space to separate reality from fiction.  Fortunately for us this has become easier over the past couple of years with a rapidly expanding customer base, powerful use cases, and partnerships with respected companies like Cisco who is now reselling our product off of its global price list via its 7,000 account managers.

What is your distribution model? Where to buy your product?

Potts: Up until recently our model has primarily been direct with channel fulfillment.  In addition to our resell relationship with Cisco, we are moving toward a more comprehensive global, two-tier channel for pull through and fulfillment.

I'd be curious to hear any general thoughts you have on market trends in this field. E.g. how does BYOD influence the security landscape ...

Potts: BYOD has already had a significant impact on how corporations best allow the use of personal computing devices, control costs and enable security to protect corporate networks and the users attached to them.

Ever since Lancope's beginnings, we have been an early-to-market innovator (sometimes too early) with many first-mover advantages.  In the case of BYOD, we cut our teeth within this aspect of the market in higher education long before it became widely recognized at the enterprise level.  University security professionals were dealing with students bringing various devices onto university networks with limited capabilities to police the use of personal computers, smartphones, etc. until products such as StealthWatch were available.  We were able to provide university security operators with a unique capability to identify by IP address the who, what, when, where and how that they couldn't see before to ensure that students and faculty were using the network appropriately.  Commercializing this capability for the Enterprise 2000, we were able to offer an even more robust version through an integrated product offering with Cisco attached to the Cisco Identity Services Engine (ISE).

What's the business model?

Potts: Our license model is perpetually tied to an annual maintenance fee for upgrades and enhancements.  We also have a subscription component for our continuous threat feed for customers that opt in for this service.  Core to our license structure is a usage model tied to network traffic volume which enables us to grow as our customers grow.  A typical customer ends up expanding their usage of our product 4-5x as data volumes tend to double every 2-3 years due to the rapid proliferation of voice, video and data.

How do you differentiate from your competitors?

Potts: Providing complete macro level network visibility and security intelligence is our key differentiator, whichenables our customers to see and detect what others can't and maintain business continuity. Very few companies have the ability to provide this macro view and even fewer have the ability to provide the scale and actionable security intelligence to make it operational.

Who are your customers? Can you talk about some of your clients?

Potts: We have over 750 customers worldwide in virtually every industry sector ranging from financial services, retail, technology and higher education to various government entities. A few of the customers we can publicly acknowledge are Cisco, HP and the U.S. Department of Defense.  The common denominator in all use case scenarios comes down to the comprehensive macro visibility we've been discussing.  This capability enables these customers to detect a malicious event as quickly as possible, and shut it down before significant data theft occurs or they experience a network disruption such as what a DDoS attack could bring if not rerouted in time.

Is your Company disrupting the technology market?

Potts: We are a disruptive Security 2.0 company that is taking market share from conventional security vendors as perimeter security gives way.  We are growing faster at 60% than what IDC has tagged as the "Specialized Analysis Threat Detection" market, a 1.2B market growing at 42% annually.

Who founded the company, when? What can you tell me about the story of the company's founding?

Potts: We were founded out of Georgia Tech in 1999 on the premise that there would be a better way to defend networks against attacks without virus signatures.  Lancope was a very early mover and shaker with a concept that wasn't completely embraced until the market realized that the AV and perimeter defense model was breaking down.  Today our technology has been further enhanced and has become a staple for our 750 customers worldwide, also driving partnerships that help us further extend our global reach.

What's next on your product roadmap?

Potts: The IT industry is in the midst of a global hardware refresh that will total more than 180B over the next 4 - 5 years.  Customers will demand that security is further built into the network and/or the cloud that serves them.  Lancope is working on the most forward leaning ways to deliver this level of security in software-defined networks and in private or public clouds to enable our customers to derive the highest level of business value and maintain business continuity.

Are you targeting a first VC round? If yes when and what will you use the funds for? How much money is being sought?

Potts: We have been profitable and /or cash flow positive for the past 4+ years and do not anticipate going back to the venture or private equity markets to support our growth.

What is your exit strategy?

Potts: We are focusing on growing the company rapidly and expanding our global presence, and are within the reach of the public markets in the not-too-distant future.

What else would you like to add?

Potts: We are constantly in a cat-and-mouse security war with the adversaries advancing their tactics as quickly as they can. Right now the cat at the perimeter is getting his tail kicked by a much smarter, faster, more agile and bigger mouse than ever before.  The need to move to Security 2.0 at the core of the network is here, and is fueling companies like Lancope.  I don't believe there will ever be a silver bullet to stop cybersecurity threats dead in their tracks.  The ability to facilitate best-of-breed partnerships will help better equip all of us with a more holistic strategy for more successfully defending public and private enterprises worldwide.  As we continue our record growth, we are focusing on building these relationships for the benefit of our customers and partners to stay on the cutting edge.

About Lancope

Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today's top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope's StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope's security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team. For more information, visitwww.lancope.com.

 

 

More Stories By Xenia von Wedel

Xenia von Wedel is a Tech blogger and Enterprise Media Consultant in Mountain View, serving clients in a variety of industries worldwide. She is focused on thought leadership content creation and syndication, media outreach and strategy. She mainly writes about Enterprise, B2B solutions, social media and open source software, but throws the occasional oddball into the mix. Buy her a coffee if you like her article: http://xeniar.tip.me

Latest Stories
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data professionals...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, shared the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
The idea of comparing data in motion (at the sensor level) to data at rest (in a Big Data server warehouse) with predictive analytics in the cloud is very appealing to the industrial IoT sector. The problem Big Data vendors have, however, is access to that data in motion at the sensor location. In his session at @ThingsExpo, Scott Allen, CMO of FreeWave, discussed how as IoT is increasingly adopted by industrial markets, there is going to be an increased demand for sensor data from the outermos...