The Stealthwatch Labs Intelligence Center™ (SLIC) is Lancope’s research initiative through which global intelligence on the Internet’s top threats is delivered to customers and the public at large. Lancope’s research group, known as Stealthwatch Labs, conducts both in-house research and taps into a broad community of third-party experts and partners to aggregate emerging threat information from around the world.
The mission of Stealthwatch Labs is to protect Lancope customers by building innovative, robust capabilities in Stealthwatch to detect, analyze, and remediate advanced security threats.
Stealthwatch Labs uses our global threat intelligence to reproduce real world attack activity in our laboratories in Atlanta, GA. Studying real world attacks and evasions, and keeping abreast of the latest developments in malicious software, enables the Stealthwatch Labs Research Team to develop and refine the behavioral anomaly detection algorithms that are at the core of Stealthwatch's security capabilities.
Customers tap into this knowledge every time they use Stealthwatch, through features like the Concern Index, which identifies hosts engaged in suspicious activity. Through Stealthwatch Labs security updates, the team delivers a regular stream of new detection capabilities based on its research to customers outside of their product upgrade cycles. These security updates provide yet another layer of assurance for defending networks from the latest threat vectors. Stealthwatch Labs also shares its threat intelligence via SLIC through a public portal, as well as a threat feed that customers can choose to incorporate into their Stealthwatch deployment.
Members of the Stealthwatch Labs Research Team have decades of combined experience at the forefront of computer security as product developers, security researchers, authors and public speakers. The Stealthwatch Labs Intelligence Center provides links to presentations and webinars by members of the research team, as well as a public blog in which the latest developments in the computer security threat landscape are discussed and dissected.