Risk
2/25/2014
05:12 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

RSA Teams With Pivotal To Offer Security Analytics And Big Data Playbook

New reference architecture provides actionable intelligence needed to detect security threats

SAN FRANCISCO, Feb. 25, 2014 /PRNewswire/ -- RSA® CONFERENCE 2014 --

News Summary:

Today, RSA and Pivotal announced the availability of a Big Data for Security Analytics reference architecture, providing insights into the visibility, analytics and actionable intelligence organizations need to detect and investigate today's security threats

RSA Security Analytics, supported by Pivotal Hadoop technology, help organizations quickly detect, investigate and respond to security incidents before they have the opportunity to impact business

The RSA Pivotal Reference Architecture serves as a guide to organizations looking to create a scalable approach to Security Analytics, and also ties into a wider approach to analytics of IT operations data and the creation of an "IT Data Lake"

Full Story:

RSA, The Security Division of EMC (NYSE: EMC), today announced the availability of a new reference architecture created with Pivotal to help organizations add flexibility and power to security analytics while laying the foundation for broader IT analytics investments. Building on the expertise of both RSA and Pivotal, this reference architecture helps organizations gain insights into the visibility, analytics and actionable intelligence they need to detect and investigate today's security threats while also providing a solid foundation for a broader 'IT Data Lake' strategy, which helps to control costs and enables organizations to gain maximum value from IT systems.

Additionally, the new reference architecture showcases how the technologies from both companies can work together to help organizations investigate and respond to security incidents before they have the opportunity to impact the business. Together, RSA and Pivotal can help security analysts and incident responders with:

Greater Visibility through full network packet capture, log collection and contextual data enrichment to spot threats designed to evade detection by common security tools.

Enhanced Analytics at the time of packet capture and throughout its lifecycle to its archival and retirement, to spot anomalies and reveal indicators of attack and compromise.

Actionable intelligence through data visualization, feeds of suspicious activity, and prioritization of alerts that allow analysts to respond appropriately to threats.

Enterprise deployability and scale, using distributed, high availability, scale-out architectures that allow for expansion and flexibility to scale to the largest of environments.

Flexibility and Agility through the ability to take advantage of new analytics modules and new data sources as they are developed or integrated, ensuring security operations are 'future-proofed' as threats and business processes evolve.

Leveraging an open Hadoop-based data warehouse, RSA Security Analytics allows customers to take advantage of the innovations coming out of the Hadoop ecosystem. By partnering with Pivotal, RSA is able to offer customers the most complete set of analytics tools on the market today – delivering superior visibility above and beyond traditional log-based solutions while lessening dependence on data science skills. By bringing together the leaders in security analytics and data science, RSA and Pivotal are delivering a foundation for a broader 'IT Data Lake' strategy, to help organizations control costs and enable IT to gain maximum value from the analytics and IT Systems.

Analyst Quote:

Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group

"Big Data is one of the most important trends in IT, but there is still confusion around what technologies to leverage in order to derive maximum value from these disparate information sources. From an information security perspective, modern data centers produce huge amounts of data about themselves that can help improve security availability, performance and efficiency, but it's often captured in silos and tough to correlate and analyze. The foundation offered by RSA and Pivotal will be extremely valuable not only for organizations looking to bolster security capabilities, but also those considering expanding their Big Data strategy beyond just security."

Pivotal Quote:

Todd Paoletti, Vice President, Product Marketing, Pivotal

"When it comes to modern day security threats, data is key to stopping the bad guys. RSA is building upon the Big Data expertise at Pivotal that lays the groundwork for a more secure computing environment. With the Big Data for Security Analytics reference architecture organizations now have a forward-looking guide to better stop threats through the use of sophisticated data and analytic techniques."

RSA Executive Quote:

Grant Geyer, Vice President, Security Analytics, RSA, The Security Division of EMC

"Last year we broke new ground with the launch of RSA Security Analytics and this year we are taking that innovation one step further. By partnering with Pivotal, we are offering customers a new, scalable approach to analytics that goes well beyond security to benefit the full IT organization"

Additional Resources:

Learn More: RSA-Pivotal Security Big Data Reference Architecture

EMC Pulse Blog: RSA & Pivotal: Big Data and Security Done Right

Learn more about RSA Security Analytics

Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast

About RSA

RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world's leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.

Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.EMC.com/RSA.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0761
Published: 2014-08-27
The DNP3 driver in CG Automation ePAQ-9410 Substation Gateway allows remote attackers to cause a denial of service (infinite loop or process crash) via a crafted TCP packet.

CVE-2014-0762
Published: 2014-08-27
The DNP3 driver in CG Automation ePAQ-9410 Substation Gateway allows physically proximate attackers to cause a denial of service (infinite loop or process crash) via crafted input over a serial line.

CVE-2014-2380
Published: 2014-08-27
Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 uses weak encryption, which allows remote attackers to obtain sensitive information by reading a credential file.

CVE-2014-2381
Published: 2014-08-27
Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 uses weak encryption, which allows local users to obtain sensitive information by reading a credential file.

CVE-2014-3344
Published: 2014-08-27
Multiple cross-site scripting (XSS) vulnerabilities in the web framework in Cisco Transport Gateway for Smart Call Home (aka TG-SCH or Transport Gateway Installation Software) 4.0 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCuq31129, CSCuq3...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.