From the Security Experts

June 11, 2012

Lancope's StealthWatch Monitoring Show Floor Traffic at Cisco Live Conference

By SIP Trunking Report Contributor

Lancope, Inc., a company specializing in flow-based security and network performance monitoring, recently stated that its StealthWatch System is monitoring show floor traffic at the ongoing Cisco Live, Cisco's annual IT and communications conference in San Diego, Calif. The solution enables quick detection and removal of any kind of malware infections stemming from attendees' devices.

By leveraging NetFlow, IPFIX, sFlow and other flow data from existing routers and switches, StealthWatch provides in-depth, borderless network visibility. With StealthWatch, network operations and security teams can obtain actionable insight into who is using the network, what applications and services are in use, and how well they are performing.

StealthWatch combines behavioral-based network performance and security monitoring with application and identity awareness at a fraction of the cost of conventional monitoring solutions. The system empowers IT teams to make faster, more informed decisions across mission-critical areas including troubleshooting, incident response, compliance, resource allocation, capacity planning and change management.

"Due to StealthWatch's unique ability to cost-effectively identify and mitigate the full spectrum of threats facing today's enterprises, Cisco leverages the system not only internally, but also as part of the mobile network monitoring solution it brings to various events," said Chris Smithee, strategic solutions architect for Lancope. "Previously, StealthWatch has monitored traffic at Cisco Live and FIRST 2011, and was recently added to the arsenal of network monitoring tools for the 'Cisco House' at the London 2012 Olympic Games."

Recently, Lancope and Central Michigan University (CMU) presented at the recently held Campus Technology Forum in Long Beach, Calif. At the forum, session attendees learned about the effects of IT consumerization on higher education networks, and how CMU successfully supports and secures roughly 7,000 mobile devices.

Edited by Rich Steeves