RSA Security Analytics leverages big data
Posted on 30 January 2013.
RSA released RSA Security Analytics – a transformational security monitoring and investigative solution designed to help organizations defend their digital assets against internal and external threats.


Any intelligence-driven security program must begin with a comprehensive understanding of risk facing the organization. Current security technologies, including SIEM tools, often fall short in this area; they cannot provided deep enough visibility into today's threats and often cannot scale to today's analytic needs.

By providing security professionals with the visibility to see and understand vulnerabilities and attacks, RSA Security Analytics is engineered to enable the discovery of risks as they occur, thus significantly cutting the time required for investigations from days to minutes.

Furthermore, by helping security professionals understand digital risks originating from both inside and outside their enterprise, organizations can better defend business assets, including intellectual property and other sensitive data, while reducing the time and cost associated with threat management and compliance-focused reporting.

The RSA Security Analytics Unified Platform is designed to deliver:

Quick capture and analysis – Security-relevant data, including full network packets, logs, and threat intelligence, are captured and quickly analyzed to speed up the detection of potential threats.

High powered analytics – Enables much larger-scale collection of data and empowers new analysis methods over that of traditional SIEM-based approaches to security.

Integrated threat intelligence – Helps organizations operationalize the use of threat intelligence feeds to accelerate detection and investigations of potential attack tools and techniques targeting the enterprise.

Context for threats – Through integrations with the RSA Archer® GRC platform and RSA® Data Loss Prevention (DLP) suite, and by fusing data produced by other products, analysts can use business context to prioritize and allocate resources to the threats which pose the greatest risk.

Malware identification – Using a variety of investigative techniques, the solution identifies a much wider range of malware-based attacks.

Automates compliance reporting – Helps enable compliance as an outcome of good security practices.





Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //