Analytics
1/31/2013
07:55 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

RSA Announces RSA Security Analytics

Solution combines SIEM, network forensics, and Big Data analytics

RSA, The Security Division of EMC Corporation (NYSE: EMC), today announced the release of RSA® Security Analytics – a transformational security monitoring and investigative solution designed to help organizations defend their digital assets against today's most sophisticated internal and external threats. Built on the proven architecture of RSA NetWitness® technology, RSA Security Analytics fuses SIEM, Network Forensics, & Big Data analytics into a security platform that will be the cornerstone of next generation security operations centers.

Any intelligence-driven security program must begin with a comprehensive understanding of risk facing the organization. Current security technologies, including SIEM tools, often fall short in this area; they cannot provided deep enough visibility into today's threats and often cannot scale to today's analytic needs.

By providing security professionals with the visibility to see and understand vulnerabilities and attacks, RSA Security Analytics is engineered to enable the discovery of risks as they occur, thus significantly cutting the time required for investigations from days to minutes. Furthermore, by helping security professionals understand digital risks originating from both inside and outside their enterprise, organizations can better defend business assets, including intellectual property and other sensitive data, while reducing the time and cost associated with threat management and compliance-focused reporting.

The RSA Security Analytics Unified Platform is designed to deliver:

Quick Capture and Analysis – Security-relevant data, including full network packets, logs, and threat intelligence, are captured and quickly analyzed to speed up the detection of potential threats. High Powered Analytics – Enables much larger-scale collection of data and empowers new analysis methods over that of traditional SIEM-based approaches to security. Integrated Threat Intelligence – Helps organizations operationalize the use of threat intelligence feeds to accelerate detection and investigations of potential attack tools and techniques targeting the enterprise. Context for Threats – Through integrations with the RSA Archer® GRC platform and RSA® Data Loss Prevention (DLP) suite, and by fusing data produced by other products, analysts can use business context to prioritize and allocate resources to the threats which pose the greatest risk. Malware Identification – Using a variety of investigative techniques, the solution identifies a much wider range of malware-based attacks. Automates Compliance Reporting – Helps enable compliance as an outcome of good security practices.

The integration of proven Big Data platforms and analytic methods into security tools provides a significant advancement to how security is performed. As built, the RSA Security Analytics platform brings together unparalleled visibility, leverages Big Data platforms and advanced analytic methods capable of identifying high risk activities, advanced threat mitigation and meeting compliance objectives.

Analyst Quote:

Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group

"The sophistication of advanced attacks and the associated malware is growing every day testing the limitations of existing security analytics tools. The Big Data phenomenon could help address this situation for security professionals making it important for organizations to rethink their choice of security solutions. Marrying intelligence-driven security with Big Data analytics has the potential to help enterprises address the complex problem of advanced threats and thus meet a significant need in the marketplace."

Executive Quote:

Amit Yoran, Senior Vice President, RSA, The Security Division of EMC

"Organizations must move beyond the constraints of traditional security and embrace agile technologies and methods for dealing with today's dynamic threats. RSA Security Analytics is engineered to reinvent security monitoring and threat detection. By combining high fidelity forensic visibility with big security data collection and management, and a complete revolution in advanced analytics, RSA is helping organizations take their security programs and advanced security operations centers to a new level."

Availability

RSA Security Analytics is now available worldwide.

Additional Resources:

Learn more about RSA Security Analytics RSA Security Analytics Launch Event: Security Analytics Like You've Never Seen January, 30 2013 at 9AM EST and 1PM EST Download the RSA Security Analytics Data Sheets Speaking of Security Blog: The Big Data Security Analytics Era Is Here Chuck Hollis via Chuck's Blog: When Big Data Changed Security Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast

About RSA

RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance- management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments.

Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, and Fraud Protection with industry-leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.EMC.com/RSA.

About EMC

EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset – information – in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at www.EMC.com.

RSA, EMC, NetWitness and Archer are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other products and/or services referenced are trademarks of their respective companies.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web