|By Xenia von Wedel||
|May 26, 2014 12:18 PM EDT||
Thanks for taking the time to answer my questions. Please tell us, what is Lancope all about and what do you do?
Mike Potts, CEO of Lancope: Good to be with you today....
Lancope's mission is to constantly deliver to our customers an overwhelming advantage in cybersecurity defense. We do this by turning the network into an online sensor grid providing superior network visibility and security intelligence.
With the perimeter security model 1.0 having become very porous and unreliable for stopping new age attacks (attacks without signatures, advanced persistent threats, and the evolving insider threat), a new set of security 2.0 requirements has emerged.
Through our more than 200 security algorithms, we are able to digest metadata known as NetFlow coming off of switches, routers, and various perimeter security devices to present an actionable, continuous macro level view of what has seeped through the perimeter. Using many of the same data sources, we are also able to get a complete view of intra-network activity to identify and shut down malicious actions long before a widespread security breach could occur.
What's new at Lancope? Pls be specific with model description etc.!)
Potts: We just released StealthWatch version 6.5 and our FlowSensor 4000. This combined offering enables us to deliver massive scalability to the largest service providers and enterprise data centers while also offering a more intuitive interface to enable a broader group of users.
The StealthWatch FlowSensor 4000 is able to handle up to 20 gigabits of sustained bandwidth to ensure our customers are able to capture the metadata required to get a complete macro view of their environment. This is nearly a 4x increase from our previous capability.
In StealthWatch 6.5, our product managers and engineers have delivered a much more intuitive product for ease of use, with improved dashboards and enhanced security intelligence capabilities to provide actionable information for faster detection and removal of threats. Through our StealthWatch Labs security research team, we have also provided additional protection from major threats by delivering behavioral security algorithms to Lancope customers outside of their product update cycles, as well as the ability to create their own custom security event alarms.
Who is your target audience and how do you intend to reach them? What is the biggest challenge you face right now in telling your story and winning over new clients?
Potts: We target chief information security officers and/or their security professionals throughout Enterprise 2000 corporations, governments, healthcare and higher education facilities worldwide.
With a lot of noise in the market and many companies claiming to do similar things, it remains an ongoing challenge for all of us in the security space to separate reality from fiction. Fortunately for us this has become easier over the past couple of years with a rapidly expanding customer base, powerful use cases, and partnerships with respected companies like Cisco who is now reselling our product off of its global price list via its 7,000 account managers.
What is your distribution model? Where to buy your product?
Potts: Up until recently our model has primarily been direct with channel fulfillment. In addition to our resell relationship with Cisco, we are moving toward a more comprehensive global, two-tier channel for pull through and fulfillment.
I'd be curious to hear any general thoughts you have on market trends in this field. E.g. how does BYOD influence the security landscape ...
Potts: BYOD has already had a significant impact on how corporations best allow the use of personal computing devices, control costs and enable security to protect corporate networks and the users attached to them.
Ever since Lancope's beginnings, we have been an early-to-market innovator (sometimes too early) with many first-mover advantages. In the case of BYOD, we cut our teeth within this aspect of the market in higher education long before it became widely recognized at the enterprise level. University security professionals were dealing with students bringing various devices onto university networks with limited capabilities to police the use of personal computers, smartphones, etc. until products such as StealthWatch were available. We were able to provide university security operators with a unique capability to identify by IP address the who, what, when, where and how that they couldn't see before to ensure that students and faculty were using the network appropriately. Commercializing this capability for the Enterprise 2000, we were able to offer an even more robust version through an integrated product offering with Cisco attached to the Cisco Identity Services Engine (ISE).
What's the business model?
Potts: Our license model is perpetually tied to an annual maintenance fee for upgrades and enhancements. We also have a subscription component for our continuous threat feed for customers that opt in for this service. Core to our license structure is a usage model tied to network traffic volume which enables us to grow as our customers grow. A typical customer ends up expanding their usage of our product 4-5x as data volumes tend to double every 2-3 years due to the rapid proliferation of voice, video and data.
How do you differentiate from your competitors?
Potts: Providing complete macro level network visibility and security intelligence is our key differentiator, whichenables our customers to see and detect what others can't and maintain business continuity. Very few companies have the ability to provide this macro view and even fewer have the ability to provide the scale and actionable security intelligence to make it operational.
Who are your customers? Can you talk about some of your clients?
Potts: We have over 750 customers worldwide in virtually every industry sector ranging from financial services, retail, technology and higher education to various government entities. A few of the customers we can publicly acknowledge are Cisco, HP and the U.S. Department of Defense. The common denominator in all use case scenarios comes down to the comprehensive macro visibility we've been discussing. This capability enables these customers to detect a malicious event as quickly as possible, and shut it down before significant data theft occurs or they experience a network disruption such as what a DDoS attack could bring if not rerouted in time.
Is your Company disrupting the technology market?
Potts: We are a disruptive Security 2.0 company that is taking market share from conventional security vendors as perimeter security gives way. We are growing faster at 60% than what IDC has tagged as the "Specialized Analysis Threat Detection" market, a 1.2B market growing at 42% annually.
Who founded the company, when? What can you tell me about the story of the company's founding?
Potts: We were founded out of Georgia Tech in 1999 on the premise that there would be a better way to defend networks against attacks without virus signatures. Lancope was a very early mover and shaker with a concept that wasn't completely embraced until the market realized that the AV and perimeter defense model was breaking down. Today our technology has been further enhanced and has become a staple for our 750 customers worldwide, also driving partnerships that help us further extend our global reach.
What's next on your product roadmap?
Potts: The IT industry is in the midst of a global hardware refresh that will total more than 180B over the next 4 - 5 years. Customers will demand that security is further built into the network and/or the cloud that serves them. Lancope is working on the most forward leaning ways to deliver this level of security in software-defined networks and in private or public clouds to enable our customers to derive the highest level of business value and maintain business continuity.
Are you targeting a first VC round? If yes when and what will you use the funds for? How much money is being sought?
Potts: We have been profitable and /or cash flow positive for the past 4+ years and do not anticipate going back to the venture or private equity markets to support our growth.
What is your exit strategy?
Potts: We are focusing on growing the company rapidly and expanding our global presence, and are within the reach of the public markets in the not-too-distant future.
What else would you like to add?
Potts: We are constantly in a cat-and-mouse security war with the adversaries advancing their tactics as quickly as they can. Right now the cat at the perimeter is getting his tail kicked by a much smarter, faster, more agile and bigger mouse than ever before. The need to move to Security 2.0 at the core of the network is here, and is fueling companies like Lancope. I don't believe there will ever be a silver bullet to stop cybersecurity threats dead in their tracks. The ability to facilitate best-of-breed partnerships will help better equip all of us with a more holistic strategy for more successfully defending public and private enterprises worldwide. As we continue our record growth, we are focusing on building these relationships for the benefit of our customers and partners to stay on the cutting edge.
Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today's top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope's StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope's security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team. For more information, visitwww.lancope.com.
One of the biggest impacts of the Internet of Things is and will continue to be on data; specifically data volume, management and usage. Companies are scrambling to adapt to this new and unpredictable data reality with legacy infrastructure that cannot handle the speed and volume of data. In his session at @ThingsExpo, Don DeLoach, CEO and president of Infobright, will discuss how companies need to rethink their data infrastructure to participate in the IoT, including: Data storage: Understand...
Mar. 1, 2015 05:00 AM EST Reads: 2,296
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
Mar. 1, 2015 04:00 AM EST Reads: 2,878
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, includin...
Mar. 1, 2015 03:30 AM EST Reads: 2,417
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
Mar. 1, 2015 02:00 AM EST Reads: 3,013
Wearable devices have come of age. The primary applications of wearables so far have been "the Quantified Self" or the tracking of one's fitness and health status. We propose the evolution of wearables into social and emotional communication devices. Our BE(tm) sensor uses light to visualize the skin conductance response. Our sensors are very inexpensive and can be massively distributed to audiences or groups of any size, in order to gauge reactions to performances, video, or any kind of present...
Mar. 1, 2015 12:00 AM EST Reads: 2,942
SYS-CON Events announced today that GENBAND, a leading developer of real time communications software solutions, has been named “Silver Sponsor” of SYS-CON's WebRTC Summit, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. The GENBAND team will be on hand to demonstrate their newest product, Kandy. Kandy is a communications Platform-as-a-Service (PaaS) that enables companies to seamlessly integrate more human communications into their Web and mobile applicatio...
Feb. 28, 2015 05:00 PM EST Reads: 1,373
VictorOps is making on-call suck less with the only collaborative alert management platform on the market. With easy on-call scheduling management, a real-time incident timeline that gives you contextual relevance around your alerts and powerful reporting features that make post-mortems more effective, VictorOps helps your IT/DevOps team solve problems faster.
Feb. 28, 2015 05:00 PM EST Reads: 1,165
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, will discuss why containers should be paired with new architectural practices such as microservices ra...
Feb. 28, 2015 04:00 PM EST Reads: 1,390
Roberto Medrano, Executive Vice President at SOA Software, had reached 30,000 page views on his home page - http://RobertoMedrano.SYS-CON.com/ - on the SYS-CON family of online magazines, which includes Cloud Computing Journal, Internet of Things Journal, Big Data Journal, and SOA World Magazine. He is a recognized executive in the information technology fields of SOA, internet security, governance, and compliance. He has extensive experience with both start-ups and large companies, having been ...
Feb. 28, 2015 04:00 PM EST Reads: 1,129
Companies today struggle to manage the types and volume of data their customers and employees generate and use every day. With billions of requests daily, operational consistency can be elusive. In his session at Big Data Expo, Dave McCrory, CTO at Basho Technologies, will explore how a distributed systems solution, such as NoSQL, can give organizations the consistency and availability necessary to succeed with on-demand data, offering high availability at massive scale.
Feb. 28, 2015 03:45 PM EST Reads: 2,220
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, shared some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, de...
Feb. 28, 2015 03:30 PM EST Reads: 3,993
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focu...
Feb. 28, 2015 03:15 PM EST Reads: 1,259
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, will discuss how DevSecOps got started and how it has evolved. Shannon Lietz has over two decades of experience pursuing next generation security solutions. She is currently the DevSecOps Leader for Intuit where she is responsible for setting and driv...
Feb. 28, 2015 03:00 PM EST Reads: 2,170
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing...
Feb. 28, 2015 02:00 PM EST Reads: 1,228
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes ...
Feb. 28, 2015 01:45 PM EST Reads: 1,160