In-Depth Network Visibility and Security Intelligence
The biggest challenge/pain point faced by CIOs which you are trying to address?
Recent attack trends have made it obvious that the only way to protect today’s networks is to obtain in-depth visibility into what is going on in the network interior. A recent industry report indicated that organizations are compromised an average of 400+ days before they can identify advanced attacks within their networks; and that stolen credentials were used across all attacks to evade security defenses.
By collecting and analyzing enterprise metadata known as NetFlow, which is inherently available from network devices such as routers and switches, Lancope’s StealthWatch System provides a cost-effective means of achieving comprehensive network visibility for quickly detecting threats.
Lancope’s vision and differentiating themes?
Lancope’s vision is to provide comprehensive, actionable network threat intelligence by leveraging the existing infrastructure to deliver a cost-effective, single pane of glass view of unusual and nefarious network activity. Lancope maximizes IT investments to create a virtual sensor grid for identifying security risks, and is highly scalable to monitor and protect the entire network, analyzing up to three million flows per second.
Lancope serves hundreds of enterprise customers worldwide, including healthcare, financial services, government and higher education institutions. We are also a Cisco® Registered Developer partner and a key component of Cisco’s Cyber Threat Defense Solution.
Customer value proposition?
With Lancope’s StealthWatch, organizations can quickly detect and halt a wide range of attacks on their networks including zero-day malware, DDoS, insider threats and APTs. The system delivers pervasive network visibility and in-depth security intelligence to thwart attacks before they lead to devastating security breaches, data loss and reputation damage.
How your product/solution has benefited your customers?
•“Immediately upon deployment, StealthWatch uncovered 400 misbehaving hosts and helped reduce network threats by 90 percent. New attacks, for which no signatures exist, now fail to gain a foothold unlike before.”
• “Before StealthWatch, we manually analyzed and correlated our network activity data. StealthWatch automatically gives us detailed network insight through a single, easy- to-use interface, aiding our security, network operations and compliance efforts.”
BlueCross BlueShield of Tennessee
• “Telenor Norway relies on flow collection and analysis from Lancope’s StealthWatch to deliver cost-effective network visibilsity, security monitoring and incident handling. StealthWatch enables security and incident response teams to remediate incidents faster than before, reducing downtime and the overall costs of managing Telenor Norway
Is there anything else you would like to add?
Lancope delivers the vision to secure and intelligence to protect enterprise networks from a full spectrum of attacks, and also provides a complete audit trail of network activity to improve forensic investigations. Our product capabilities are continuously enhanced by the StealthWatch Labs research team to keep customers protected from the latest threats. Those interested in learning more can visit www.lancope.com or contact us at email@example.com.
Safer Deposits: Beating the Cyber-threats Targeting Banks
Implementing Checkpoint for Productivity
By Nancy S. Wolk, CIO, Alcoa - Global Business Services
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Bryson Koehler, EVP & CIO, The Weather Company, an IBM...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Lowell Gilvin, Chief Process Officer, Jabil
By Dennis Hodges, CIO, Inteva Products
By Gerri Martin-Flickinger, CIO, Adobe Systems
By Walter Carvalho, VP& Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Kushagra Vaid, GM, Server Engineering, Microsoft
By Steve Beason, Enterprise CTO, Scientific Games
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Alberto Ruocco, CIO, American Electric Power