Click here to close now.

Welcome!

Websphere Authors: Liz McMillan, Pat Romanski, JP Morgenthal, Elizabeth White, AppDynamics Blog

News Feed Item

New RedSeal 6.5 Platform Illuminates Network Dark Space and Offers the Industry's Most Complete Picture of Network Security Risk With Support for BYOD, SIEM and Deeper Risk Metrics

Leader in Security Risk Management Estimates Organizations Aren't Monitoring up to 18% of Their Network, Leaving "Dark Space" Vulnerable to Cyber Threats

SANTA CLARA, CA -- (Marketwire) -- 02/05/13 -- RedSeal Networks, the leader in security risk management for cyber attack prevention, announced today that it is shipping the latest version of the RedSeal Platform to protect companies and government agencies from attacks across the network. Companies are especially in vulnerable network "dark space" -- the up to 18% of network infrastructure that is unmanaged, unmonitored, and unseen by security tools because administrators don't know it exists. With RedSeal 6.5, customers can now get a complete security risk map, including all infrastructure, to reduce the attack risk surface and properly prioritize risk mitigation strategies. RedSeal now extends its continuous monitoring and security risk management capabilities to include over 60 new features such as support for bring your own device (BYOD) initiatives, deeper risk metrics and SIEM integration.

Network security dark space is defined as any network infrastructure that doesn't appear in the "database of record" or "golden store" of configuration data, including firewalls, routers, proxies, load balancers, as well as endpoints and hosts. In a highly complex network with tens of thousands of nodes, this represents a massive challenge for organizations. RedSeal estimates that most organizations are only monitoring as little as 82% of their network, leaving up to 18% as network dark space -- left exposed simply because it's not on their radar.

"In an ideal world, CISOs, CIOs, IT security directors and administrators can take a look at their network and close any gaps that expose vulnerabilities, but the reality is, most organizations have 'known unknowns' -- assets that are out of sight, not properly monitored or tracked, but important due to their downstream impact on other assets that are visible," said Parveen Jain, president and CEO of RedSeal Networks. "You can't protect what you can't see. RedSeal 6.5 helps our customers find the unknown parts of their network and visualize risk to proactively prevent cyber-attacks."

The RedSeal 6.5 Platform
RedSeal 6.5 adds over 60 new features to the platform in order to meet the rigorous requirements of some of the world's largest networks. First, RedSeal is extending its security risk management capabilities to visualize and monitor access policy for wireless network controllers. Support for wireless network controllers extends visibility to constantly changing and elusive Wi-Fi endpoints.

With the rise of BYOD initiatives it can be critical to monitor additional endpoints and ensure that access to critical network assets is monitored. According to a January 2013 report from Osterman Research that surveyed 112 North American companies and government organizations with over 500 employees, one-third of organizations that offer Wi-Fi access to guests do not have a dedicated guest network, allowing non-employees to access the same corporate assets as employees. The report also found that while 82% of companies cite security as a major concern around BYOD, nearly 30% have no security software or protocols in place around their BYOD program.

"Network security assurance is a process that benefits from methodical, recurring sweeps for vulnerabilities and gaps," said Michael Tennefoss, Aruba Networks' Vice President of Strategic Partnerships. "Aruba's Mobile Virtual Enterprise (MOVE) architecture, with ClearPass Access Management system, delivers best-in-class BYOD and Wi-Fi security that is complemented by RedSeal's on-going compliance monitoring. Accessing data seamlessly from Aruba's Wi-Fi infrastructure enables RedSeal to obtain a more complete topology map and risk model for faster detection of security risks and gaps in security posture."

In addition to wireless network support, RedSeal 6.5 adds deeper risk analysis and metrics for proactive mitigation of threats and reactive damage assessment analysis in the event of an attack. Analytics for proactive threat mitigation include Common Configuration Enumeration (CCE) scores to identify host configuration risk and in addition to vulnerability scores to identify the highest risk systems. Damage assessment analysis defines the scope of a compromise and helps rationalize the extent of potential impact for IT response teams.

RedSeal 6.5 also includes extensive integration into three of the leading Security Information and Event Management (SIEM) solutions. The integration bridges the divide between proactive and reactive security systems with an additional level of network context and event filtering for faster response to critical incidents and a reduction in event overload. RedSeal Networks currently supports leading SIEM platforms, including HP ArcSight, McAfee Enterprise Security Manager, and IBM Q1.

"Throughout my many years in information security, I am continuously surprised by the obvious vulnerabilities within most networks. The recent explosion of BYOD only serves to extend the potential attack surface, adding risk and complexity," said Jon Oltsik, senior principal analyst at ESG. "Thankfully, we have seen some strong innovation in risk management recently, making it easier than ever for security practitioners to visualize their networks, identify vulnerabilities and enhance threat prevention."

The RedSeal 6.5 Platform is available immediately.

About RedSeal Networks, Inc.
RedSeal Networks is the leading provider of security risk management solutions for cyber attack prevention. Using patented network visualization and predictive threat modeling, RedSeal provides the most complete picture of risk from cyber attacks. The RedSeal Platform delivers the industry's most powerful network security insights, illuminates network security dark space and enables enterprises to continuously monitor controls. The world's largest government and commercial organizations use RedSeal to prioritize vulnerability remediation efforts, dramatically cut compliance costs and optimize their security architectures.

For more information, visit RedSeal at www.redsealnetworks.com

MEDIA CONTACTS
Chris Fucanan
H3O Communications
chris@h3ocommunications.com
415-618-8809

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
The recent trends like cloud computing, social, mobile and Internet of Things are forcing enterprises to modernize in order to compete in the competitive globalized markets. However, enterprises are approaching newer technologies with a more silo-ed way, gaining only sub optimal benefits. The Modern Enterprise model is presented as a newer way to think of enterprise IT, which takes a more holistic approach to embracing modern technologies.
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
Every day we read jaw-dropping stats on the explosion of data. We allocate significant resources to harness and better understand it. We build businesses around it. But we’ve only just begun. For big payoffs in Big Data, CIOs are turning to cognitive computing. Cognitive computing’s ability to securely extract insights, understand natural language, and get smarter each time it’s used is the next, logical step for Big Data.
There's no doubt that the Internet of Things is driving the next wave of innovation. Google has spent billions over the past few months vacuuming up companies that specialize in smart appliances and machine learning. Already, Philips light bulbs, Audi automobiles, and Samsung washers and dryers can communicate with and be controlled from mobile devices. To take advantage of the opportunities the Internet of Things brings to your business, you'll want to start preparing now.
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal an...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect at Hookflash, will walk through the shifting landscape of traditional telephone and voice services ...
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Architect for the Internet of Things and Intelligent Systems at Red Hat, described how to revolutioniz...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons. In the IoT vision, every new "thing" - sensor, actuator, data source, data con...
Container frameworks, such as Docker, provide a variety of benefits, including density of deployment across infrastructure, convenience for application developers to push updates with low operational hand-holding, and a fairly well-defined deployment workflow that can be orchestrated. Container frameworks also enable a DevOps approach to application development by cleanly separating concerns between operations and development teams. But running multi-container, multi-server apps with containers is very hard. You have to learn five new and different technologies and best practices (libswarm, sy...
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data retrieval. They can easily adapt to new data sets and provide access to both structured and unstruc...
There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big Data and deployments are processing massive data volumes from wearables, utilities and other machines...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you'll have no problem fil...
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
The worldwide cellular network will be the backbone of the future IoT, and the telecom industry is clamoring to get on board as more than just a data pipe. In his session at @ThingsExpo, Evan McGee, CTO of Ring Plus, Inc., discussed what service operators can offer that would benefit IoT entrepreneurs, inventors, and consumers. Evan McGee is the CTO of RingPlus, a leading innovative U.S. MVNO and wireless enabler. His focus is on combining web technologies with traditional telecom to create a new breed of unified communication that is easily accessible to the general consumer. With over a de...
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize supplier management. Learn about enterprise architecture strategies for designing connected systems tha...
Cloud is not a commodity. And no matter what you call it, computing doesn’t come out of the sky. It comes from physical hardware inside brick and mortar facilities connected by hundreds of miles of networking cable. And no two clouds are built the same way. SoftLayer gives you the highest performing cloud infrastructure available. One platform that takes data centers around the world that are full of the widest range of cloud computing options, and then integrates and automates everything. Join SoftLayer on June 9 at 16th Cloud Expo to learn about IBM Cloud's SoftLayer platform, explore se...
SYS-CON Media announced today that 9 out of 10 " most read" DevOps articles are published by @DevOpsSummit Blog. Launched in October 2014, @DevOpsSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce softw...