News

Lumeta releases IPsonar with enhanced network perimeter defense

SearchSecurity.com Staff

Lumeta Corp. announced a new release of IPsonar, which now includes Enhanced Perimeter Discovery (EPD), at the 2012 RSA conference.

IPsonar 5.4 identifies the network perimeter and demarcates

    Requires Free Membership to View

between the known and unknown in a network. It uses leak detection and network discovery capabilities to detect, identify, map and analyze every device on the network. IPsonar is designed to identify gaps in network perimeter defense by verifying the behavior of firewalls and other network devices.

Enhanced Perimeter Discovery (EPD) uses a targeted approach to identify devices on the network that have the ability to pass traffic into unauthorized networks. When systems forward traffic to unknown, unauthorized or untrusted networks, IPsonar’s EPD detects and sends an alert on the complete context of the network conversation, including details on the device or host and the addresses and networks connected to, potentially identifying holes in a network’s perimeter.

Additional new features and improvements available in IPsonar 5.4 include data push, enhanced visualization and supplemental discovery.

Data Push allows IPsonar reports to appear on the reporting interface menu as they are completed on the server without refreshing the browser. This feature also now includes user-created views and dashboards, as well as custom reports.

Enhanced Visualization maps the context of connections and allows users to focus on specific areas of interest and investigate specific network segments. Also, the node menu can now display the details of any node.

Supplemental Discovery allows IP addresses discovered during Layer 2 Discovery to be fed back into other components of the product, including Host Discovery, Device Discovery and Leak Discovery.

According to Lumeta, IPsonar is designed to allow customers to discover, document and defend the true network perimeter by providing network and security personnel with the information necessary to remediate potentially damaging network conversations.

-Stephanie Wright, Contributor

View all of our RSA 2012 Conference coverage.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: