EDS Chooses RSA EnVisionEDS Chooses RSA EnVision
EDS has been successfully using a suite of RSA solutions
January 29, 2007
BEDFORD, Mass. -- RSA, The Security Division of EMC (NYSE: EMC), and EDS, a leading global technology services company, today announced that EDS has been successfully using a suite of RSA solutions, including the RSA enVisionT solution acquired from Network Intelligence, with several EDS clients. EDS is also using the solution to monitor its own devices and network.
EDS has a layered and scalable security model across all of its outsourcing services to promote the security and protection of client data, and to help meet the necessary compliance and reporting requirements to those clients. RSA enVision software is engineered to take audit data in the form of logs, aggregate it across the enterprise, and turn it into actionable intelligence. The solution is also engineered to be scalable and can accommodate the needs of a global enterprise like EDS. RSA enVision software is built to allow EDS to collect, store, and manage data, and interoperates with the EMCR CenteraR and EMC CelerraR networked storage platforms. Customers looking for long-term compliance event data throughout its information lifecycle cost-effectively deploy the Centera solution, and use the end-to-end Celerra solution for network attached security event data.
"We're pleased to be working with EMC, and have collaborated closely in the past to add features into the RSA enVision solution to support EDS' offerings," said Peter Reid, chief privacy officer, EDS. "Our internal systems are predicted to generate about one trillion events per month, and we believe that the RSA enVision solution is the only platform that can support such volumes of compliance and security event data. Using RSA security offerings, we believe we are offering our clients the most secure business solutions."
RSA Security Inc. (Nasdaq: EMC)
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Managed Security and the 3rd Party Cyber Risk Opportunity Whitepaper