Security monitoring for BYOD environments
Posted on 25 April 2012.
Bookmark and Share
Lancope showcased its solution for securing bring-your-own-device (BYOD) environments based on the company's flow-based monitoring technology.


Unlike other BYOD security solutions that require organizations to install software on every new device, Lancope's StealthWatch System provides comprehensive security for any device entering the network, without having to install additional software on the device or deploy expensive probes.

Instead, StealthWatch conducts sophisticated behavioral analysis on flow data from existing infrastructure to deliver end-to-end visibility and security across an organization's entire network.

Already inherent in routers, switches and other network infrastructure devices, the use of flow data to monitor network and host activity provides a cost-effective solution for analyzing the behavior of mobile devices. By leveraging flow data with enterprise-ready solutions like StealthWatch, organizations can proactively detect issues stemming from users' personal smartphones, tablets or laptops.

Flow-based monitoring can uncover external attacks like botnets, worms, viruses or APTs, as well as internal risks such as network misuse, policy violations and data leakage. It can also be leveraged for other efforts including regulatory compliance and capacity planning, and for ensuring high levels of network and mobile device performance.

Leveraging NetFlow, sFlow and packet capture, the StealthWatch System combines flow-based anomaly detection and network performance monitoring into a single, integrated enterprise platform for security and network operations. By delivering unified visibility across physical and virtual networks, StealthWatch eliminates network blind spots and reduces total network and security management costs.

"Alongside other trends and challenges including virtualization, user mobility and advanced persistent threats (APTs), BYOD is further clouding network visibility and making it even more difficult for administrators to maintain effective control over what is going on within their networks," said Mike Potts, president and CEO of Lancope. "While conventional security solutions are losing ground among today's constantly-evolving technology environment, next-generation solutions like StealthWatch enable enterprises to easily adapt to emerging trends without sacrificing network integrity and protection."





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //