Tag: Security Intelligence

StealthWatch Featured at HP Protect

This week at HP Protect in Washington, D.C., attendees will be able to learn about how HP is using Lancope’s StealthWatch System to improve network visibility and security. During a session entitled, “Bigger data means bigger security,” an expert from HP will discuss technologies such as StealthWatch that enable enterprises to access and analyze massive amounts of network data to create actionable security intelligence. READ MORE

July “University of NetFlow” Seminars – Hartford, Toronto and Atlanta

Starting next week, July will bring a full schedule of Lancope “University of NetFlow” seminars to Hartford, Toronto and Atlanta. Attendees to these complimentary seminars will learn how to harness the power of NetFlow data within their existing infrastructure to cost-effectively obtain comprehensive network visibility and security intelligence. READ MORE

Looking East and West

While northbound (egress) monitoring is a necessary component in catching advanced threats, it is only one piece of effective network surveillance. To determine the impact of a breach and to create an accurate timeline, lateral (east/west) monitoring is also a critical component. NetFlow monitoring can provide a cost-effective means of cataloging this intelligence. READ MORE

NetFlow Training Courses in May

Lancope's University of NetFlow will host four training courses in May in Boston, Montreal, Minneapolis and Chicago. Attendees will learn how to harness the power of NetFlow for dramatically improved network security and risk posture. READ MORE

Lancope’s Analysis of the Verizon 2013 Data Breach Report

Verizon has recently published the 2013 edition of its highly regarded Data Breach Investigations Report. Including analysis of more than 47,000 reported security incidents and 621 confirmed data breaches, the report reveals some very telling statistics and trends involving cyber security. Most importantly, it points to the fact that incident response and network surveillance need to be playing a much bigger role in organizations’ overall security strategies. READ MORE