Subscribe and receive the latest news from the industry.
Join 62,000+ members. Yes it's completely free.
September 15, 2003
ATLANTA -- Lancope, Inc., the leading provider of behavior-based threat detection and network intelligence solutions, today announced the general availability of StealthWatch+Therminator (SW+T(tm)). SW+T provides unprecedented real-time visualization of network traffic and patternless detection of known and unknown attacks to protect sensitive data as well as network assets. Lancope developed SW+T in cooperation with the National Security Agency (NSA), the Defense Information Systems Agency (DISA) and the Naval Postgraduate School (NPS). Through a licensing agreement, the government has transferred the Therminator(tm) technology to Lancope.
"As cyber attacks continue to rise in sophistication and virulence, early indications and warnings are more critical than ever. The sooner new exploits or vulnerabilities are detected, the earlier we can take action against them," said Rear Admiral David Ellison, superintendent of the Naval Postgraduate School in Monterey, California. Faculty and students at the defense university were involved in research and assessment of Therminator technology. "Through technology transfer legislation, such as the Stephenson-Wylder Technology Transfer Act which promotes integrated research and develop partnerships with companies like Lancope and other leading technology innovators, we can keep pace with the latest IT challenges and meet a critical security need for today's networks by rapidly co-developing solutions inspired by the warfighters themselves."
"By establishing a committed relationship with the government, Lancope has successfully completed this co-development initiative to build, test, deliver and support a product that presents the best features of COTS (Commercial Off The Shelf) and government developed technologies," said Dr. Dave Ford, DoD joint coordinator for the SW+T initiative. "Lancope has done a fantastic job in accelerating development of the first-ever Therminator commercial capability and the timing could not be better."
Dr. John McEachen, director of the NPS Reconfigurable Intrusion Detection and Deception Laboratory Research (RIDDLR) adds, "Signature-based IDSs [Intrusion Detection System] and virus scanners are not engineered to make that strategically important first detection of new or previously unknown attacks. Recent rapidly spreading worms, such as the Blaster and SQL Slammer, use an increasingly sophisticated means of propagation through random source and destination IP's and various ports, significantly complicating the signature writing process for traditional IDSs. In these situations, patternless technologies are the perfect addition to the cyber defenders' toolkit."
According to Dr. John Copeland, founder, chairman and chief scientist with Lancope, "In conjunction with the NSA and the DoD, Lancope has developed a unique information security technology that not only helps public agencies combat cyber warfare, but also gives private organizations the additional ability to detect sophisticated cyber attacks in real-time. SW+T delivers powerful advanced visualization capabilities and the ability to rapidly understand malicious activity without a flood of false positives and the escalating costs associated with ongoing maintenance of signature databases."
SW+T combines Therminator's complex data reduction and data visualization technology with StealthWatch(tm)'s recognition of unknown threats, powerful flow analysis abilities, network surveillance and forensic trail of network activity for tracing events in real-time and retroactively. Powered by thermodynamic-based algorithms, SW+T visualization clearly distinguishes anomalous network behavior and deviations from a state of network traffic equilibrium. Most importantly, SW+T enables the rapid progression from real-time visual identification of nefarious activity to a comprehensive understanding of the underlying event details through the time-based Events Log, host-based flow analysis and associated packet captures. Armed with this enhanced network security technology, government agencies and private organizations can more effectively protect sensitive and classified data as well as network assets.
Visualization. As data traffic flows across the monitored network, SW+T tracks, analyzes and displays the patterns of change that occur as a result of transmission and reception of data packets between user-defined groups of network devices. As a result, previously undetectable nefarious activity becomes visibly apparent in real-time.
Events Log. The time-based Events Log builds a record of the underlying network activity reflected in the SW+T graphs. With one-click access from the areas of interest identified by the noticeable peaks in the SW+T graphs, the Events Log provides immediate awareness of the network activity underlying the suspicious events.
Advanced Flow Log and Packet Analysis. For an in-depth understanding of anomalous events, the Events Log is correlated with specifics about host-level activity and underlying packet details that can be easily and extensively examined using enhanced flow log and packet analysis.
Availability and Pricing
SW+T is generally available as of August 31, 2003. Pricing for SW+T begins at $35,000.
You May Also Like
Rethinking AIOPs — It's All About the DataMar 12, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Fiddling with Fixed WirelessMar 21, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Cable and 5G: The Odd Couple?Apr 18, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Delivering the DAA DifferenceMay 16, 2024