<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: StealthWatch in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25374#M657</link>
    <description>Thank you all for information!&lt;BR /&gt;
&lt;BR /&gt;
For now it's only comparison at the stage of rendering a similar solution.&lt;BR /&gt;
Only for understanding can we do the similar or not and how we can do this.</description>
    <pubDate>Thu, 16 Feb 2017 15:59:00 GMT</pubDate>
    <dc:creator>Alexandr_P</dc:creator>
    <dc:date>2017-02-16T15:59:00Z</dc:date>
    <item>
      <title>StealthWatch</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25366#M649</link>
      <description>Hello, all!&lt;BR /&gt;
&lt;BR /&gt;
Can you tell me, please, what analog of Cisco's StealthWatch we have?&lt;BR /&gt;
&lt;BR /&gt;
Thank you!</description>
      <pubDate>Thu, 09 Feb 2017 19:53:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25366#M649</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2017-02-09T19:53:00Z</dc:date>
    </item>
    <item>
      <title>RE: StealthWatch</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25367#M650</link>
      <description>Hi.    Extreme SIEM is able to do the same = behavioral analysis based on flows. In advance SIEM is able to correlate flows with logs from firewall and antivirus and more =&amp;gt; much better from the false positive point of view.    Regards    Z.</description>
      <pubDate>Thu, 09 Feb 2017 20:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25367#M650</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2017-02-09T20:39:00Z</dc:date>
    </item>
    <item>
      <title>RE: StealthWatch</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25368#M651</link>
      <description>Hello, Pala!&lt;BR /&gt;
&lt;BR /&gt;
In Cisco switches work with StealthWatch (Bundle Catalyst 3650,  Lancope StealthWatch).&lt;BR /&gt;
Where switches work with StealthWatch Appliance as a sensor.&lt;BR /&gt;
We have to do this with IPFIX on our switches G2?&lt;BR /&gt;
Or there is other way?&lt;BR /&gt;
&lt;BR /&gt;
Thank you!</description>
      <pubDate>Thu, 09 Feb 2017 20:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25368#M651</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2017-02-09T20:39:00Z</dc:date>
    </item>
    <item>
      <title>RE: StealthWatch</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25369#M652</link>
      <description>We can use flow based switches = does have unsampled NetFlow on each and every port without performance degradation.&lt;BR /&gt;
&lt;BR /&gt;
We can use X460-G2 = does have ipfix support&lt;BR /&gt;
&lt;BR /&gt;
We can use any other Extreme Switch with SFLOW support.&lt;BR /&gt;
&lt;BR /&gt;
Extreme SIEM does support sflow, netflow, jflow, ipfix, cflowd, qflow, raw data...</description>
      <pubDate>Thu, 09 Feb 2017 20:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25369#M652</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2017-02-09T20:39:00Z</dc:date>
    </item>
    <item>
      <title>RE: StealthWatch</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25370#M653</link>
      <description>Another question is - how SIEM integrate with NetSight?&lt;BR /&gt;
&lt;BR /&gt;
Sorry, but I have little knowledge about Extreme's SIEM.&lt;BR /&gt;
&lt;BR /&gt;
Thank you!</description>
      <pubDate>Thu, 09 Feb 2017 21:43:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25370#M653</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2017-02-09T21:43:00Z</dc:date>
    </item>
    <item>
      <title>RE: StealthWatch</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25371#M654</link>
      <description>The integration between Extreme Control (identity and access management / network access management) is done through alarming = if anything changes with the endsystem the syslog message is generated (java application does have bell icon). Extreme SIEM (Qradar) does recognize the format.&lt;BR /&gt;
&lt;BR /&gt;
The integration between Extreme Analytics (purview) in old versions was done through syslog. in the new version it is through ipfix = from Analytics Engine to SIEM.&lt;BR /&gt;
&lt;BR /&gt;
Z.</description>
      <pubDate>Sat, 11 Feb 2017 06:10:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25371#M654</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2017-02-11T06:10:00Z</dc:date>
    </item>
    <item>
      <title>RE: StealthWatch</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25372#M655</link>
      <description>Cisco Stealthwatch uses Net flow to provide visibility across the network, data center, branch offices, and cloud. Its advanced security analytics uncover stealthy attacks on the extended network. Stealthwatch helps us use our existing network as a security sensor and enforce to dramatically improve the threat defense. As per extreme standard this can be replaced as s flow in stead of net flow to serve this better. &lt;BR /&gt;
&lt;BR /&gt;
Please find below the article link to configure s flow on extreme devices:&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-sFlow/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-sFlow/&lt;/A&gt;</description>
      <pubDate>Mon, 13 Feb 2017 10:20:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25372#M655</guid>
      <dc:creator>Tripathy__Priya</dc:creator>
      <dc:date>2017-02-13T10:20:00Z</dc:date>
    </item>
    <item>
      <title>RE: StealthWatch</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25373#M656</link>
      <description>Hope you got the response which you were looking for. If needed any more info then let us know on this.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 16 Feb 2017 15:49:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25373#M656</guid>
      <dc:creator>Tripathy__Priya</dc:creator>
      <dc:date>2017-02-16T15:49:00Z</dc:date>
    </item>
    <item>
      <title>RE: StealthWatch</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25374#M657</link>
      <description>Thank you all for information!&lt;BR /&gt;
&lt;BR /&gt;
For now it's only comparison at the stage of rendering a similar solution.&lt;BR /&gt;
Only for understanding can we do the similar or not and how we can do this.</description>
      <pubDate>Thu, 16 Feb 2017 15:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/stealthwatch/m-p/25374#M657</guid>
      <dc:creator>Alexandr_P</dc:creator>
      <dc:date>2017-02-16T15:59:00Z</dc:date>
    </item>
  </channel>
</rss>

