EDS Chooses RSA EnVisionEDS Chooses RSA EnVision
EDS has been successfully using a suite of RSA solutions
January 29, 2007

BEDFORD, Mass. -- RSA, The Security Division of EMC (NYSE: EMC), and EDS, a leading global technology services company, today announced that EDS has been successfully using a suite of RSA solutions, including the RSA enVisionT solution acquired from Network Intelligence, with several EDS clients. EDS is also using the solution to monitor its own devices and network.
EDS has a layered and scalable security model across all of its outsourcing services to promote the security and protection of client data, and to help meet the necessary compliance and reporting requirements to those clients. RSA enVision software is engineered to take audit data in the form of logs, aggregate it across the enterprise, and turn it into actionable intelligence. The solution is also engineered to be scalable and can accommodate the needs of a global enterprise like EDS. RSA enVision software is built to allow EDS to collect, store, and manage data, and interoperates with the EMCR CenteraR and EMC CelerraR networked storage platforms. Customers looking for long-term compliance event data throughout its information lifecycle cost-effectively deploy the Centera solution, and use the end-to-end Celerra solution for network attached security event data.
"We're pleased to be working with EMC, and have collaborated closely in the past to add features into the RSA enVision solution to support EDS' offerings," said Peter Reid, chief privacy officer, EDS. "Our internal systems are predicted to generate about one trillion events per month, and we believe that the RSA enVision solution is the only platform that can support such volumes of compliance and security event data. Using RSA security offerings, we believe we are offering our clients the most secure business solutions."
RSA Security Inc. (Nasdaq: EMC)
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023