STEALTHWATCH MANAGEMENT CONSOLE

Similar documents
STEALTHWATCH MANAGEMENT CONSOLE

Network Performance + Security Monitoring

Cisco Cyber Threat Defense - Visibility and Network Prevention

REVOLUTIONIZE THE WAY YOU VIEW YOUR NETWORK GAIN A UNIFIED VIEW OF SECURITY AND NETWORK OPERATIONS ACROSS PHYSICAL AND VIRTUAL NETWORKS

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Cisco IPS 4200 Series Sensors

Using Lancope StealthWatch for Information Security Monitoring

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

QRadar SIEM and FireEye MPS Integration

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

with NetFlow Technology Adam Powers Chief Technology Officer

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Cisco ASA 5500 Series Advanced Inspection and Prevention Security Services Module

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

RAVEN, Network Security and Health for the Enterprise

Symantec Advanced Threat Protection: Network

QRadar Security Intelligence Platform Appliances

Cisco Advanced Malware Protection for Endpoints

Secure Cloud-Ready Data Centers Juniper Networks

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Cisco WAE Deployed with Cisco ACNS: Product Function Matrix. Two 10/100/1000BASE-T. Two 10/100/1000BASE- T

Unified Security, ATP and more

Xirrus Management System

How To Manage Sourcefire From A Command Console

Unified network traffic monitoring for physical and VMware environments

Cisco SR 520-T1 Secure Router

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope

Observer Probe Family

IBM SECURITY QRADAR INCIDENT FORENSICS

Cisco Performance Visibility Manager 1.0.1

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

SANS Top 20 Critical Controls for Effective Cyber Defense

Network Management and Monitoring Software

Cisco ASA 5500 Series IPS Solution

Delivers fast, accurate data about security threats:

Security Information & Event Manager (SIEM)

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Security Information & Event Manager (SIEM)

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Observer Probe Family

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

How To Manage Security On A Networked Computer System

Cisco Intrusion Detection System Services Module (IDSM-2)

IBM QRadar Security Intelligence Platform appliances

Dell SonicWALL report portfolio

G DATA TechPaper #0275. G DATA Network Monitoring

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Risk Manager

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Clavister InSight TM. Protecting Values

5View NetFlow Powerful Real-time Application Flow Monitoring and Analysis

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

Aternity Desktop and Application Virtualization Monitoring. Complete Visibility Ensures Successful Outcomes

How To Protect Your Network From Attack From A Network Security Threat

Best Practices for Building a Security Operations Center

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

End-user Security Analytics Strengthens Protection with ArcSight

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

FlowMon. Complete solution for network monitoring and security. INVEA-TECH

Best Practices for NetFlow/IPFIX Analysis and Reporting

Cisco IOS Flexible NetFlow Technology

IBM Security Network Protection

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Best Practices for Outdoor Wireless Security

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

IBM Tivoli Netcool network management solutions for enterprise

Network Performance Management Solutions Architecture

How To Manage A Network With Ccomtechnique

2012 Global Security and Network Performance Monitoring Product Differentiation Excellence Award

IBM Security QRadar QFlow Collector appliances for security intelligence

Find the needle in the security haystack

Open Source Software for Cyber Operations:

Observer Analysis Advantages

Introduction. The Inherent Unpredictability of IP Networks # $# #

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

The Critical Role of Netflow/IPFIX Telemetry in the Next- Generation Network Security Infrastructure

IBM Security QRadar Risk Manager

Transcription:

System STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations and security teams obtain actionable insight into who is using the network, what applications and services are in use and how well they are performing. The System delivers total, unified network visibility from a single, integrated platform to improve threat detection and incident response while increasing network availability and reducing enterprise risk. The Management Console (SMC) provides the single vantage point for disparate IT groups to see contextual information about all activity across the network and to investigate accordingly. It is available as either a physical or virtual appliance. Solve Issues in Minutes, Not Days with Pervasive Network Visibility With the SMC, gone are the days when different IT departments spent hours and even days trying to isolate the root cause of an issue before finally being able to deploy the appropriate personnel to take corrective action. By simply glancing at the SMC s user-friendly graphical interface, operators can immediately spot and zoom in on any unusual behavior. Using the SMC s unique drilldown features, IT personnel can go from identifying the issue to isolating the root cause within minutes, identifying affected applications and users along the way, thereby reducing Mean Time To Know (MTTK), enhancing operational efficiency and decreasing costs. The SMC is a centralized control center with customizable views and powerful drill-down capabilities. external attacks, network exposures and policy violations. The SMC also enhances network management through trend analysis, firewall and capacity planning, and performance monitoring. Visualize and Troubleshoot APTs, Malware and Insider Threats The SMC empowers the security team to proactively identify threats on the network that could lead to data breaches or performance issues. From worms, viruses and other malware to targeted attacks, DDoS, insider threats and APTs, the System provides the in-depth visibility and security context needed to thwart evolving threats. The System quickly zooms in on any unusual behavior, immediately sending an alarm to the SMC with the contextual information necessary for security personnel to take quick, decisive action to mitigate any potential damage. Administrators can rapidly detect and prioritize security threats, pinpoint network misuse and suboptimal performance and manage event response across the enterprise all from a single control center. Armed with graphical representations of network traffic, customized summary reports and integrated security and network intelligence, operators can easily identify internal and www.lancope.com 1

By collecting, analyzing and storing large amounts of NetFlow, IPFIX and other types of flow data for extended periods of time, the System also provides a full audit trail of all network transactions for more effective forensic investigations. Comprehensive network intelligence eliminates the time-consuming and resource-intensive manual investigation associated with other solutions. Gain More Insight into Evolving Threats with the New SLIC Threat Feed The Labs TM Intelligence Center (SLIC) is Lancope s research initiative through which global intelligence on the Internet s top threats is delivered to customers and the public. Lancope s research group, Labs, conducts both in-house research and taps into a broad community of third-party experts and partners to aggregate emerging threat information from around the world. Through the SLIC Threat Feed, Lancope correlates real-time intelligence on global threats with suspicious network activity to alert on hosts infected with advanced malware, including botnet activity. The SMC s sophisticated flow visualization enables operators to immediately understand attack activity, propagation and impact, quickly identifying points of entry to expedite incident response and fortify defenses. Continuously monitoring customer networks for thousands of known command-and-control servers, the threat feed further enhances Lancope s early threat detection capabilities, preventing cyber-attacks from wreaking havoc on corporate and government networks. Accelerate Problem Resolution with Customizable Relational Flow Mapping With real-time, customizable relational flow maps, the SMC provides network operations and security teams with graphical views of the current state of the organization s traffic. Within seconds, these teams can see exactly where to focus their attention. The SMC allows administrators to easily construct maps of their network based on any criteria, such as location, function or virtual environment. By creating a connection between two groups of hosts, operators can quickly analyze the traffic traveling between them. Then, simply by selecting a data point in question, they can drill down to gain even deeper insight into what is happening at any point in time. With the SLIC Threat Feed, data on known botnets is automatically incorporated into the System. www.lancope.com 2

Analyze Network Traffic Down to the Application and User Level With the advent of Web 2.0, as much as 85% of all network traffic is now going through port 80. As a result, distinguishing between individual applications has become increasingly difficult. Both network operations and security teams need to know what, when and how applications are in use across the enterprise to optimize performance and secure the network. Shedding Light on the NAT Blind Spot with NAT Stitching Using data from select devices, the System can unify NAT information from inside the firewall with information from outside the firewall to pinpoint which IPs and users inside the network are responsible for a particular action. Access to this unique information prevents would-be hackers and other bad actors from hiding behind NAT. With NAT stitching, organizations can quickly identify the source of any possible outbound attack or copyright violation notice. Relational flow maps enable network and security personnel to quickly investigate areas that need attention. The SMC brings true Layer 7 application visibility to network and security teams by gathering application information and packet-level metrics and displaying them in easily understood pie charts, graphs and tables. In addition, administrators can use the SMC to define their own custom applications based on IP addresses. For example, one group of IP addresses can represent all of the Exchange servers in the organization. Another group of IP addresses can represent all of the DNS servers and so on. Increasingly, access to endpoint data for a full contextual view is necessary for complete analysis. Being able to launch and analyze data from an endpoint agent offers a greater degree of visibility to devices connected to the network. Change parameters and modify data to fit desired needs adds even higher fidelity to user traffic. The System stitches NAT communications together to enhance visibility at the network edge. How It Works The SMC configures, coordinates and manages the System appliances, including FlowCollector, FlowSensor, and IDentity appliances. As these devices gather intelligence from critical segments throughout the enterprise, they feed it to the SMC. The SMC in turn correlates this information in real time and displays it in an easily understood graphical format. Along with flow export technologies, the System can collect data from other types of technologies, such as firewalls, Web proxies, intrusion detection devices (IDS), intrusion prevention systems (IPS) and network admission control (NAC) systems. The SMC associates this data with behavior-based, flow-driven events, displays it graphically and stores it in the database for further analysis. Real-time visualization helps network and security teams identify risky user behaviors such as P2P file sharing. www.lancope.com 3

or Management Console Management Console Virtual Edition (VE) Syslog, SNMP NetFlow/sFlow or UDP Director FlowCollector FlowCollector Virtual Edition (VE) Cisco ISE IDentity NetFlow/sFlow + Application Information + Packet-Level Metrics Legacy Traffic Analysis Software NetFlow, Syslog, SNMP NetFlow-enabled Routers, Switches, Firewalls FlowSensor vsphere with FlowSensor VE User and Device Information The SMC provides centralized management, configuration and reporting for all System devices. Management Console Features Matrix *Limited functionality with sflow Features Network Security User identity tracking Flexible deployment options, including virtual Quick root-cause analysis, troubleshooting Relational flow maps NAT stitching Custom dashboards Custom reports Automated blocking, remediation or rate limiting Top N reports for applications, services, ports, protocols, hosts, peers and conversations Traffic composition breakdown Customizable user interface based on Point-of-View TM technology Support for multi-gigabit and large-scale MPLS network environments Advanced flow visualization Massive scalability Combined internal and external monitoring Capacity planning and historical traffic trending WAN optimization reporting* DSCP bandwidth utilization Worm propagation visualization Internal security for high-speed networks www.lancope.com 4

tealthwatch Management Console Specificatio SMC 500 and 1010* SMC 2010* Network Management Port 1; 10/100/1000 Copper Database Capacity 1 TB (RAID-6 Redundant) 2 TB (RAID-6 Redundant) Hardware Platform Hardware Generation Rack Units (Mountable) Power Heat Dissipation Dimensions Weight Rails Regulatory R630 13G 1U Redundant 750W AC, 50/60 Hz Auto Ranging (100V to 240V) 2,891 BTU per hour maximum Height: 1.68 in. (4.3 cm) Width: 17.08 in. (43.4 cm) Depth: 27.25 in. (69.2 cm) 41 lb (18.6 kg) Sliding Ready Rails with Cable Management Arm FCC (U.S. only) Class A DOC (Canada) Class A CE Mark (EN55022 Class A, EN55024, EN61000-3-2, EN 61000-3-3, EN60950) VCCI Class A UL 1950 CSA 950 * System v6.7 specifications. **The maximum fps can change depending on varying network conditions. SMC Virtual Edition (VE) The SMC Virtual Edition (VE) is designed to perform the same function as the appliance edition, but in a VMware environment. The SMC VE Minimum Resource Requirements table shows the minimum resource requirements for the SMC VE to operate based on the number of FlowCollectors sending it data. However, the SMC VE scales dynamically according to the resources allocated to it. Therefore, for the SMC VE to operate effectively, be sure to allocate resources so that they are reserved for the SMC VE and not shared with any other virtual machine. SMC VE Minimum Resource Requirements FlowCollectors Concurrent Users Reserved Memory Storage 1 Up to 2 4 GB 2 Up to 3 Up to 5 8 GB 3 Up to 5 Up to 10 16 GB 4 Note: If the External Event processing (Syslog) feature is used, then more memory and processing resources will be required. LEARN MORE. REQUEST A DEMO. sales@lancope.com 2015 Lancope, Inc. Lancope,, and other trademarks are registered or unregistered trademarks of Lancope, Inc. All other trademarks are properties of their respective owners. DS-v6.7-r03-04012015 www.lancope.com 5