ThomasNet News Logo
Sign Up | Log In | ThomasNet Home | Promote Your Business

Lancope to Present Ponemon Research on Incident Response and Showcase Next-Generation Security Solutions at RSA Conference 2014

Print | 
Email |  Comment   Share  

Lancope
3650 Brookside Pkwy.
Alpharetta, GA, Georgia 30022
USA



Press release date: February 24, 2014

Company to share best practices and innovative technologies for dramatically improved threat detection, network forensics and incident response

ATLANTA – RSA CONFERENCE - Lancope, Inc., a leader in network visibility and security intelligence, will share industry best practices and showcase next-generation technology for combating advanced threats at RSA Conference 2014 taking place this week in San Francisco, CA. Through several speaker presentations, and a strong presence on the show floor, Lancope will educate RSA Conference attendees on how to improve their threat detection, network forensics and incident response efforts to better defend their networks from the vast array of cyber-attacks targeting today's enterprises.

On Wednesday, February 26, Lancope Director of Security Research Tom Cross will join Dr. Larry Ponemon of the Ponemon Institute, as well as panelists from General Motors, Viewpost and The Chertoff Group, to present the findings of a recent Ponemon Institute study on incident response. During the panel, "Why Cyber Incident Response Teams Get No Respect," Cross and the others will share their insights into why many of today's organizations are not as prepared as they should be to fend off advanced attacks, and why CEOs are in the dark about cyber-attacks facing their companies. The panelists will also share best practices for building a strong Computer Security Incident Response Team (CSIRT) with the executive support and respect it needs to succeed.

Lancope CTO Tim "TK" Keanini will also present a session at the RSA Conference on Tuesday, February 25 entitled, "OODA Loop as an Advanced Persistent Defense." During the session, Keanini will illustrate how military strategist John Boyd's OODA Loop (a concept originally applied to combat operations) can be leveraged to improve cyber security and develop an "advanced persistent defense" for thwarting sophisticated, targeted attacks.

"As cyber-attacks continue to escalate and affect a rapidly growing number of organizations, now is the time for security teams and C-level executives alike to reevaluate their network protection strategies," said Keanini. "The conventional reliance on perimeter- and signature-based defenses is no longer working. Lancope prides itself on innovation, and we look forward to sharing our forward-thinking security technologies, research and strategies with our peers at the RSA Conference."

In addition to presenting two sessions, Lancope will also exhibit its new StealthWatch® System Version 6.5 as well as showcase its solutions for retail security breach detection and network forensics at RSA Conference Booth #3634 (North Expo). Lancope and the StealthWatch System will also have a presence at the RSA Conference booths of several partner organizations, including Cisco, Radware, Emulex and Ixia.

Lancope's StealthWatch System Version 6.5 includes an intuitive Web interface and sophisticated alarming capabilities for enhanced usability, security analytics and early threat detection. Specific new features include the following:

-  The Operational Network & Security Intelligence (ONSI) dashboard keeps track of the attacker's "kill chain," providing StealthWatch System administrators with awareness of how far attacks are progressing within their networks.
-  New "data hoarding" alarms detect attackers who are moving stolen data around within internal networks or preparing it for exfiltration. This functionality is especially beneficial for industries such as government, healthcare and retail that store large quantities of sensitive information.
-  StealthWatch Labs Security Updates provide constantly updated, automated security capabilities in the StealthWatch System to detect the latest threats.
-  User-defined Threat Criteria enable StealthWatch System administrators to monitor their networks for targeted attack activity based on specific threat intelligence.

"Recent attacks against retail establishments are a reminder that organizations need to be able to detect each step that attackers go through when they break in and steal data," said Lancope's Tom Cross. "Any organization with sensitive information on its internal network should have visibility into what is happening on the network and the ability to detect when data is on the move. The new features in StealthWatch System 6.5 provide visibility into all stages of a targeted attack scenario and shed light on aspects of attacker behavior that other security technologies miss - such as the staging of data for exfiltration."

By leveraging NetFlow, IPFIX and other flow data from existing infrastructure, the StealthWatch System cost-effectively turns the entire network into a sensor grid for detecting anomalous traffic and behaviors. The new 6.5 platform provides an extremely adaptive and responsive system that combines enhanced security intelligence with simplified, streamlined delivery. For additional details on StealthWatch System 6.5, go to: h
ttp://www.lancope.com/files/collateral/Lancope-DS-StealthWatch-Whats-New-6.5.pdf
.

About Lancope

Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today's top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope's StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope's security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team. For more information, visit www.lancope.com.

©2014 Lancope, Inc. All rights reserved. Lancope, StealthWatch, and other trademarks are registered or unregistered trademarks of Lancope, Inc. All other trademarks are properties of their respective owners.

Source 
Lancope, Inc.

Contact:
Lesley Sullivan/Kendra Dorr
MSLGROUP
+1 (781) 684-0770
Lancope@SchwartzMSL.com

Web Site: http://www.lancope.com


Print | 
Email |  Comment   Share  
Contacts: View detailed contact information.


 

Post a comment about this story

Name:
E-mail:
(your e-mail address will not be posted)
Comment title:
Comment:
To submit comment, enter the security code shown below and press 'Post Comment'.
 



 See related product stories
More .....
 See more product news in:
Software
 More New Product News from this company:
Network Threat Detection Software promotes visibility, security.
Advanced Threat Detection Software offers analysis, remediation.
Network Security Software helps proactively identify threats.
Network Monitoring Software offers virtual deployment options.
Network Management Software optimizes contextual awareness.
More ....
| Featured Manufacturing Jobs
 Other News from this company:
Lancope StealthWatch System Selected as Best Forensics Solution in Info Security Products Guide Global Excellence Awards
Lancope Delivers Operational Network Security and Visibility with New Levels of Advanced Threat Intelligence
Lancope to Hold First Annual "VISION" User Conference
Lancope Joins Forces with Team Cymru to Deliver Advanced Threat Intelligence
More ....
 Tools for you
Watch Company 
View Company Profile
Company web site
More news from this company
E-mail this story to a friend
Save Story
Search for suppliers of
Network Management Software
Data Security Software
Software
Computer Security Software
Join the forum discussion at:
Engineers Lounge


Home  |  My ThomasNet News®  |  Industry Market Trends®  |  Submit Release  |  Advertise  |  Contact News  |  About Us
Brought to you by Thomasnet.com        Browse ThomasNet Directory

Copyright © 2014 Thomas Publishing Company. All Rights Reserved.
Terms of Use - Privacy Policy



Error close

Please enter a valid email address