Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

2/25/2013
10:17 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

RSA Launches RSA NextGen Security Operations Services To Help Customers Build Battle-Ready Cyber Defenses

Escalation of cyberthreats is driving organizations to revamp their approach to prepare for, respond to, and mitigate advanced cyberthreats

SAN FRANCISCO, Feb. 25, 2013 /PRNewswire/ -- RSACONFERENCE 2013 --

News Summary:

-- RSA announced immediate availability of The RSA® NextGen Security Operations Center (SOC) services designed to help customers transform traditional security operations into agile, analytics-based teams that can defend with confidence against advanced threats. -- Cyber threats have changed tactics and vectors, causing organizations that are leveraging legacy perimeter/signature-based tools with outdated processes to be ill-prepared to defend their organizations. -- To be better prepared for the proliferation of advanced threats, organizations are in need of expertise to build or revamp their SOC and implement Big Data security analytics, revamp security operations processes and procedures and automate related workflows. -- The new services are designed to deliver the expertise needed for customers to leverage advanced capabilities found in new solutions such as RSA® Security Analytics with actionable intelligence, modern risk assessment tools and proven methodologies to reduce breach exposure, threat response and remediation time. Full Story:

RSA, The Security Division of EMC (NYSE: EMC), today announced the release of RSA® NextGen Security Operations Center (SOC) services designed to help organizations establish the core foundations for security operations while integrating newly released security analytics, threat intelligence, incident response and asset criticality capabilities. This transformation of the SOC can help organizations respond faster and more efficiently to attacks, reduce breach exposure times and develop more predictive defense capabilities.

The RSA NextGen SOC services offer customers access to a deep bench of highly trained security practitioners with real-world experience in cyber defense who are capable of fulfilling SOC requirements specifically tailored to each organization's unique needs. These services are designed to establish the organizational foundation required to prepare for, discover and respond to threats in an agile, methodical and repeatable approach that reduces risk and business impact of incidents.

The RSA NextGen SOC services are designed to deliver customers a repeatable and sustainable service delivery framework that can enable organizations to transform current state reactive security programs into a predictive, intelligence-driven Advanced SOC. The services are engineered to ultimately deliver a program for organizations to leverage actionable data that can be presented in a unified method to aid security analysts and operators to make real-time decisions on incidents to help minimize impact to their organization.

As IT infrastructures and threats have evolved, driven by cloud, mobility and the hyper-connectivity of data centers, organizations are left struggling with tools, processes and skills designed to defend a non-existent perimeter. To be fully prepared for the advanced nature and proliferation of future threats, organizations are starting to take action now to revamp their SOC and incorporate newly released advanced security analytics, intelligence and risk assessment tools on top of traditional security controls for defense in depth.

RSA's approach helps facilitate actionable intelligence for security teams by focusing on key technical and operational areas including:

-- Aggregation and analysis of threat intelligence data -- Correlation of content intelligence data throughout the organization -- Deployment of solutions that provide advanced analytic intelligence capabilities -- Development of security operations processes and procedures and the automation of related workflows RSA Executive Quote:

Peter Tran, Senior Director, RSA Advanced Cyber Defense Practice

"In today's evolving threat landscape, it is critical that you unify three key perspectives to give you a battle ready SOC that is based on real-world needs and not academic policies. Our new service offering is designed to be delivered by expert practitioners with an average of 10 years of experience who understand how to integrate existing controls with the latest cutting edge solutions, streamline key security processes and incorporate valuable threat research to design a SOC for tomorrow's attacks, not yesterday's."

Analyst Quote:

Christina Richmond, Program Director, Security Services, IDC

"We're seeing a prevailing shift among organizations around the allocation of resources and attention away from traditional, perimeter-based and reactive security methods and technologies to newer intelligence-driven analytic approaches that are more effective in helping mitigate advanced threats. By moving to these new approaches, organizations must update and enhance the skills of security analysts, the tools they use to gain a new level of threat visibility and also the processes and methods employed to prioritize and respond to incidents."

On March 14, 2013, RSA will host a webcast to provide additional detail and answer questions about the features and benefits of the RSA NextGen Security Operations services. To register, please visit www.EMC.com/RSA.

Additional Resources:

-- Get more information on RSA Advanced Cyber Defense Services -- RSA Podcast: "Building a Next Generation SOC - Using Intelligence to Find the Threats" -- EMC Pulse Blog: "Preparing for the Inevitable - New RSA Service Helps Customers Defend Against Advanced Threats" -- White Paper: "EMC Critical Incident Response Center" -- Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast. About RSA

RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments.

Combining business-critical controls in identity assurance, encryption & key management, SIEM, Security Analytics, Data Loss Prevention and Fraud Protection with industry-leading GRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.EMC.com/RSA.

EMC and RSA are either registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other products and/or services referenced are trademarks of their respective companies.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19012
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
CVE-2019-19022
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
CVE-2019-19035
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.
CVE-2019-19011
PUBLISHED: 2019-11-17
MiniUPnP ngiflib 0.4 has a NULL pointer dereference in GifIndexToTrueColor in ngiflib.c via a file that lacks a palette.
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.