RSA Security Analytics leverages big data
Posted on 30 January 2013.
RSA released RSA Security Analytics – a transformational security monitoring and investigative solution designed to help organizations defend their digital assets against internal and external threats.

Any intelligence-driven security program must begin with a comprehensive understanding of risk facing the organization. Current security technologies, including SIEM tools, often fall short in this area; they cannot provided deep enough visibility into today's threats and often cannot scale to today's analytic needs.

By providing security professionals with the visibility to see and understand vulnerabilities and attacks, RSA Security Analytics is engineered to enable the discovery of risks as they occur, thus significantly cutting the time required for investigations from days to minutes.

Furthermore, by helping security professionals understand digital risks originating from both inside and outside their enterprise, organizations can better defend business assets, including intellectual property and other sensitive data, while reducing the time and cost associated with threat management and compliance-focused reporting.

The RSA Security Analytics Unified Platform is designed to deliver:

Quick capture and analysis – Security-relevant data, including full network packets, logs, and threat intelligence, are captured and quickly analyzed to speed up the detection of potential threats.

High powered analytics – Enables much larger-scale collection of data and empowers new analysis methods over that of traditional SIEM-based approaches to security.

Integrated threat intelligence – Helps organizations operationalize the use of threat intelligence feeds to accelerate detection and investigations of potential attack tools and techniques targeting the enterprise.

Context for threats – Through integrations with the RSA Archer® GRC platform and RSA® Data Loss Prevention (DLP) suite, and by fusing data produced by other products, analysts can use business context to prioritize and allocate resources to the threats which pose the greatest risk.

Malware identification – Using a variety of investigative techniques, the solution identifies a much wider range of malware-based attacks.

Automates compliance reporting – Helps enable compliance as an outcome of good security practices.


Pen-testing drone searches for unsecured devices

You're sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer buzzes to life and, after spitting out your print job, it continues to work and presents you with more filled pages than you expected.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Oct 9th