Network Computing is part of the Informa Tech Division of Informa PLC
Lancope Ships StealthWatch 5.6
ATLANTA -- Lancope, Inc., the leading provider of the StealthWatch System, the most widely used Network Behavior Analysis (NBA) and response solution, today announced the general availability of StealthWatch System 5.6. The system-wide upgrade includes powerful new features, including Live Alarms, High-Performance Flow Queries, Dynamic Data Aging and Storage Optimization, Failover Configuration and interoperability with Foundry Networks IronView Network Manager (INM). These features significantly extend the scalability and value of behavior-based anomaly detection and network performance monitoring for enterprise organizations.
A single, unified system for security and network operations, StealthWatch provides detailed views of anomalies and network utilization for security analysts, network engineers and network planners. Visit http://www.lancope.com/news/webinars/ to access An Exclusive Look at StealthWatch System 5.6, a Webinar led by Lancope Chief Technology Officer Adam Powers, who describes how each new feature benefits teams within the IT organization.
Lancope's StealthWatch combines behavior-based anomaly detection with traffic reporting and network optimization data. The resulting visibility enables network teams to efficiently manage complex networks without the need for additional hardware and software. StealthWatch can also detect zero-day, targeted, low-slow and unknown attacks which enhances network operations and security as well. said Chris Liebert, a senior analyst for Yankee Group.
With this release of StealthWatch, the best of breed NBA solution, we are delivering even greater functionality to unify network security and operations, said Harland LaVigne, president and CEO of Lancope. The delicate balance between business enablement, network availability and security requires a powerful combination of network performance monitoring and behavior-based anomaly detection. The new features in StealthWatch System 5.6 provide security personnel with more focused, actionable views of risk across the enterprise, assist network planners with more historical data for capacity planning and benefit operations personnel with business continuity assurance.
Recommended For You
What skills do network managers really need to properly secure industrial networks? What new protocols, frameworks, and regulations are important? And what conferences and certifications can help? Here are five tips to get started.
A full-stack approach to retail edge offers retailers a way to optimize operations and adapt to changes in a post-pandemic world.
Network management tool sprawl is getting in the way of network management. It’s time for IT to do something about it.