Analytics
1/31/2013
07:55 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

RSA Announces RSA Security Analytics

Solution combines SIEM, network forensics, and Big Data analytics

RSA, The Security Division of EMC Corporation (NYSE: EMC), today announced the release of RSA® Security Analytics – a transformational security monitoring and investigative solution designed to help organizations defend their digital assets against today's most sophisticated internal and external threats. Built on the proven architecture of RSA NetWitness® technology, RSA Security Analytics fuses SIEM, Network Forensics, & Big Data analytics into a security platform that will be the cornerstone of next generation security operations centers.

Any intelligence-driven security program must begin with a comprehensive understanding of risk facing the organization. Current security technologies, including SIEM tools, often fall short in this area; they cannot provided deep enough visibility into today's threats and often cannot scale to today's analytic needs.

By providing security professionals with the visibility to see and understand vulnerabilities and attacks, RSA Security Analytics is engineered to enable the discovery of risks as they occur, thus significantly cutting the time required for investigations from days to minutes. Furthermore, by helping security professionals understand digital risks originating from both inside and outside their enterprise, organizations can better defend business assets, including intellectual property and other sensitive data, while reducing the time and cost associated with threat management and compliance-focused reporting.

The RSA Security Analytics Unified Platform is designed to deliver:

Quick Capture and Analysis – Security-relevant data, including full network packets, logs, and threat intelligence, are captured and quickly analyzed to speed up the detection of potential threats. High Powered Analytics – Enables much larger-scale collection of data and empowers new analysis methods over that of traditional SIEM-based approaches to security. Integrated Threat Intelligence – Helps organizations operationalize the use of threat intelligence feeds to accelerate detection and investigations of potential attack tools and techniques targeting the enterprise. Context for Threats – Through integrations with the RSA Archer® GRC platform and RSA® Data Loss Prevention (DLP) suite, and by fusing data produced by other products, analysts can use business context to prioritize and allocate resources to the threats which pose the greatest risk. Malware Identification – Using a variety of investigative techniques, the solution identifies a much wider range of malware-based attacks. Automates Compliance Reporting – Helps enable compliance as an outcome of good security practices.

The integration of proven Big Data platforms and analytic methods into security tools provides a significant advancement to how security is performed. As built, the RSA Security Analytics platform brings together unparalleled visibility, leverages Big Data platforms and advanced analytic methods capable of identifying high risk activities, advanced threat mitigation and meeting compliance objectives.

Analyst Quote:

Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group

"The sophistication of advanced attacks and the associated malware is growing every day testing the limitations of existing security analytics tools. The Big Data phenomenon could help address this situation for security professionals making it important for organizations to rethink their choice of security solutions. Marrying intelligence-driven security with Big Data analytics has the potential to help enterprises address the complex problem of advanced threats and thus meet a significant need in the marketplace."

Executive Quote:

Amit Yoran, Senior Vice President, RSA, The Security Division of EMC

"Organizations must move beyond the constraints of traditional security and embrace agile technologies and methods for dealing with today's dynamic threats. RSA Security Analytics is engineered to reinvent security monitoring and threat detection. By combining high fidelity forensic visibility with big security data collection and management, and a complete revolution in advanced analytics, RSA is helping organizations take their security programs and advanced security operations centers to a new level."

Availability

RSA Security Analytics is now available worldwide.

Additional Resources:

Learn more about RSA Security Analytics RSA Security Analytics Launch Event: Security Analytics Like You've Never Seen January, 30 2013 at 9AM EST and 1PM EST Download the RSA Security Analytics Data Sheets Speaking of Security Blog: The Big Data Security Analytics Era Is Here Chuck Hollis via Chuck's Blog: When Big Data Changed Security Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast

About RSA

RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance- management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments.

Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, and Fraud Protection with industry-leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.EMC.com/RSA.

About EMC

EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset – information – in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at www.EMC.com.

RSA, EMC, NetWitness and Archer are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other products and/or services referenced are trademarks of their respective companies.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.