Lookingglass Updates Cyber Security for Enterprise, CloudJuly 17, 2012 No Comments
SOURCE: Integration Developer News
Cybersecurity company Lookingglass Cyber Solutions is shipping an alert and warning system to suppress threats and protect against network vulnerabilities to enterprise networks as well as to Internet-based connections to partners and providers. The company’s Cyber-Heads-Up-Display (CyberHUD) works with Lookingglass’ appliance-based ScoutVision and cloud-based CloudScout products.
CyberHUD monitors global networks for resiliency, threats, malware, routing hi-jacks and malicious actor’s tools, tactics and procedures, according to the company. The offering is architected to correlate and prioritize worldwide threat sources and cyber intelligence services, integrating with, and enhance existing security infrastructure.
The Lookingglass ScoutVision and CloudScout products add context to threat intelligence, which lets customers take preventative countermeasures, according to Lookingglass CEO Derek Gabbard. In specific, these products integrate, correlate and prioritize various threat feeds and then put those threats in context, allowing a company to better decide which threats are the most serious.
“In an environment where computing resources are becoming increasingly dispersed and perimeter defenses are obviated by network topologies, ScoutVision enables customers to monitor the security of all the networks through which their information travels and resides,” Gabbard said in a statement.
Organizations need to monitor their cyber ecosystems continuously so they can quickly figure out whether their networks are harboring known threats, he added. With CyberHUD, organizations can combine data from their networks with that cyber intelligence to quickly determine the significance of the threats so they can handle them effectively, Gabbard said.
Under the covers, CyberHUD alert and warning capabilities continuously monitor customer, provider and partner networks for key aspects of network integrity – including resiliency, threats, malware, routing hi-jacks, and malicious tools, tactics, and procedures, according to Gabbard. This data helps customers to prioritize threat mitigation efforts based on massive amounts of data.
In fact, CyberHUD and ScoutVision can monitor based on continuous routing data that describe ownership of more than 53,000 autonomous systems, 500,000 CIDR blocks, billions of IP addresses. ScoutVision also can aggregate over 40 million trace routes daily to provide context to more than 35 proprietary and open source threat feeds. So far in 2012, Lookingglass has identified more than 80 million unique malicious IPs, Gabbard added
CyberHUD works with Lookingglass ScoutVision to provide:
Continuous Monitoring – Alert and warning capabilities to continuously monitor for threats, such as the presence of Botnets and other malicious hosts, cyber attacks, hijacks and loss of network resiliency.
Efficient Threat Intelligence Analysis – Lets users to aggregate and analyze global cyber intelligence sources and identify global threats as soon as they emerge. It enriches intelligence with data from its users’ internal enterprise network.
Information Chain Risk Management - To enable “information chain risk management” ScoutVision delivers insight into all activity that occurs within an organization’s network. It also delivers actionable intelligence from information chain partners, infrastructure providers, and cloud infrastructure networks.
The Lookingglass website explains why gathering data over time is a key strategy for detecting and defusing threats. A suspicious event is not defined in a fixed moment of time. Rather, it unfolds in a series of moments in which behavioral trends and intentions start to become clear. Identifying an emerging data security threat and coming to a belief of what it is, where it will hit and what will be its impact requires complete visibility into vast Internet pathways and real-time awareness. Because a new situation can emerge every few seconds, cyber analysts need a solution that can identify and monitor activity and prevent disruptive security issues anywhere they occur throughout the supply chain, partner networks and consumer community – at all times.
Lookingglass’ approach to offer a comprehensive and real-time view of network and Internet infrastructure, activity and connections uses a visual depiction of physical and virtual network topologies. This also makes it easier to accurately identify, isolate and address emerging threats or situations.CLOUD COMPUTING, SECURITY