DataTorrent
Language Flags

Translation Disclaimer

HPCwire Enterprise Tech HPCwire Japan
Leverage Big Data'14

January 30, 2013

RSA Announces Security Analytics


RSA, The Security Division of EMC Corporation, today announced the release of RSA Security Analytics – a security monitoring and investigative solution designed to help organizations defend their digital assets against today's most sophisticated internal and external threats.

Built on the architecture of RSA NetWitness technology, RSA Security Analytics fuses SIEM, Network Forensics, & Big Data analytics into their security platform.

RSA Security Analytics is engineered to enable the discovery of risks as they occur in order to cut the time required for investigations. Furthermore, by helping security professionals understand digital risks originating from both inside and outside their enterprise, organizations can better defend business assets, including intellectual property and other sensitive data, while reducing the time and cost associated with threat management and compliance-focused reporting.

The RSA Security Analytics Unified Platform is designed to deliver:

  • Quick Capture and Analysis -- Security-relevant data, including full network packets, logs, and threat intelligence, are captured and quickly analyzed to speed up the detection of potential threats.
  • High Powered Analytics – Enables both larger-scale collection of data and new analysis methods over that of traditional SIEM-based approaches to security.
  • Integrated Threat Intelligence – Helps organizations operationalize the use of threat intelligence feeds to accelerate detection and investigations of potential attack tools and techniques targeting the enterprise.
  • Context for Threats – Through integrations with the RSA Archer GRC platform and RSA Data Loss Prevention (DLP) suite, and by fusing data produced by other products, analysts can use business context to prioritize and allocate resources to the threats which pose the greatest risk.
  • Malware Identification – Using a variety of investigative techniques, the solution aims to identify a much wider range of malware-based attacks.
  • Automates Compliance Reporting – Helps enable compliance as an outcome of good security practices.

"The sophistication of advanced attacks and the associated malware is growing every day testing the limitations of existing security analytics tools," said Jon Oltsik, senior principal analyst at Enterprise Strategy Group. "The Big Data phenomenon could help address this situation for security professionals making it important for organizations to rethink their choice of security solutions. Marrying intelligence-driven security with Big Data analytics has the potential to help enterprises address the complex problem of advanced threats and thus meet a significant need in the marketplace."

Share Options


Subscribe

» Subscribe to our weekly e-newsletter


Discussion

There are 0 discussion items posted.

 

Most Read Features

Most Read News

Most Read This Just In



Sponsored Whitepapers

Planning Your Dashboard Project

02/01/2014 | iDashboards

Achieve your dashboard initiative goals by paving a path for success. A strategic plan helps you focus on the right key performance indicators and ensures your dashboards are effective. Learn how your organization can excel by planning out your dashboard project with our proven step-by-step process. This informational whitepaper will outline the benefits of well-thought dashboards, simplify the dashboard planning process, help avoid implementation challenges, and assist in a establishing a post deployment strategy.

Download this Whitepaper...

Slicing the Big Data Analytics Stack

11/26/2013 | HP, Mellanox, Revolution Analytics, SAS, Teradata

This special report provides an in-depth view into a series of technical tools and capabilities that are powering the next generation of big data analytics. Used properly, these tools provide increased insight, the possibility for new discoveries, and the ability to make quantitative decisions based on actual operational intelligence.

Download this Whitepaper...

View the White Paper Library

Sponsored Multimedia

Webinar: Powering Research with Knowledge Discovery & Data Mining (KDD)

Watch this webinar and learn how to develop “future-proof” advanced computing/storage technology solutions to easily manage large, shared compute resources and very large volumes of data. Focus on the research and the application results, not system and data management.

View Multimedia

Video: Using Eureqa to Uncover Mathematical Patterns Hidden in Your Data

Eureqa is like having an army of scientists working to unravel the fundamental equations hidden deep within your data. Eureqa’s algorithms identify what’s important and what’s not, enabling you to model, predict, and optimize what you care about like never before. Watch the video and learn how Eureqa can help you discover the hidden equations in your data.

View Multimedia

More Multimedia

ISC'14

Job Bank

Datanami Conferences Ad

Featured Events

May 5-11, 2014
Big Data Week Atlanta
Atlanta, GA
United States

May 29-30, 2014
StampedeCon
St. Louis, MO
United States

June 10-12, 2014
Big Data Expo
New York, NY
United States

June 18-18, 2014
Women in Advanced Computing Summit (WiAC ’14)
Philadelphia, PA
United States

June 22-26, 2014
ISC'14
Leipzig
Germany

» View/Search Events

» Post an Event