University of Manchester Chooses StealthWatch to Improve Network Management

Lancope, Inc., the provider of the StealthWatch® System, today announced that The University of Manchester has chosen the StealthWatch to monitor network behavior, detect network incidents and identify affected machines and users. NetFlow-based StealthWatch reduces total network and security management costs for The University of Manchester.

As Britain's largest single-site university, The University of Manchester has 35,000 students and more than 11,000 staff. The network includes 15,000 campus PCs, plus 11,000 more computers in residence halls. Two data centers house highly available systems to provide business applications, e-mail, Web access, storage and more. The University of Manchester's Directorate of IT Services is responsible for centralized IT services and support, as well as local services for faculty teams.

"We have a large, complex network with a lot of unmanaged desktop machines," said Tony Arnold, IT Security Coordinator for The University of Manchester. "We knew viruses, bots and Trojans were hitting the network and that a significant amount of illegal file sharing was occurring, but we had no tools to detect unwanted or anomalous behavior. Nor did we have any tools that could analyze the type of traffic on our network."

After spending weeks investigating and resolving an incident involving suspiciously high traffic levels to and from certain network services, The University of Manchester IT staff realized it needed a solution for improved network visibility. First they investigated intrusion prevention systems (IPS), but soon realized that IPS technology could not provide a holistic view of the campus network without a huge expense.

"Khipu Networks, our Lancope reseller, suggested network behavior analysis technology and arranged a trial of StealthWatch," said Arnold. "We found StealthWatch so useful right away; it delivered exactly what we wanted, so we decided to deploy it on our network."

The University of Manchester uses the StealthWatch Xe for NetFlow collector appliance to gather high-speed traffic information from each of the University's six core routers for analysis by the StealthWatch Management Console. The University of Manchester also relies on the StealthWatch IDentity appliance to link individual users with specific network events for increased user accountability and faster, more immediate insight into unexpected network and security events.

With detailed visibility insight into network traffic patterns, link utilization and overall network performance, StealthWatch dramatically accelerates network and security troubleshooting.

Prior to StealthWatch, investigating network events was a cumbersome, time-consuming process. "Individual system administrators had to manually gather information from their system and then come together to correlate behaviors in an attempt to pinpoint the source of the problem," said Arnold. "Now we simply access the StealthWatch Management Console for a consolidated view of network traffic and behavior. The system is incredibly flexible and tunable as well."

Using StealthWatch, The University of Manchester IT staff has spotted trouble on the network before it was noticed anywhere else. And, it has saved valuable time in identifying specific users who have accessed a particular system.

According to Arnold, "StealthWatch will improve our customer service and keep us more proactive when it comes to addressing network behavior and security incidents."

"Khipu Networks partners with Lancope because we see StealthWatch as a 'no-brainer' solution for any organization seeking holistic network visibility and performance management without the cost and complexity of deploying in-line technologies. Furthermore, StealthWatch easily scales to accommodate any network throughput, which for Universities sector often means Gigabit and more," said Vil Dhutia, commercial consultant for Khipu Networks. "The University of Manchester relies on StealthWatch daily, highlighting the need among all Universities for non-intrusive network behavior analysis."

"Universities maintain large, complex networks that require continuous visibility and control, but often lack the resources necessary for optimal network performance and security demands," said Harland LaVigne, president and CEO of Lancope. "We designed the StealthWatch System to help institutions, like The University of Manchester, optimize security, network and virtual operations while maximizing limited resources. The University of Manchester joins more than 60 other academic institutions across 25 countries in recognizing StealthWatch network behavior analysis as an integral part of a complete security and network management strategy."

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3