Welcome!

Containers Expo Blog Authors: Pat Romanski, Elizabeth White, Flint Brenton, Yeshim Deniz, Maria C. Horton

News Feed Item

RSA Turns the Table on Cyber Attackers

RSA® Advanced Security Operations Center Solution Engineered to Detect and Remediate Advanced Threats Faster Than Ever, Helps Customers Evolve From Hunted to Hunter

WASHINGTON, Sept. 9, 2014 /PRNewswire/ -- RSA GLOBAL SUMMIT --

STORY HIGHLIGHTS

  • New RSA® Advanced Security Operation Center Solution arms security teams with new tools to help identify undetected threats that often result in data breaches.
  • Real-time detection of emerging and targeted threats without a reliance on signatures, resulting in faster time to mitigation.
  • Enables security teams to be far more effective with current skills and resources.
  • Addresses SIEM, Network Forensics, or Endpoint detection needs, either individually or within one overall solution.

Today, RSA, The Security Division of EMC (NYSE: EMC), introduces the RSA® Advanced Security Operations Center (SOC) Solution, an integrated set of technologies and services designed to help organizations identify threats before a breach can occur.  

As IT innovations including cloud, social, Big Data and mobile computing are helping move organizations forward; they are also creating greater opportunities for cyber attackers to bypass both legacy and contemporary security tools. Combining security information and event management, (SIEM), full packet capture network forensics and endpoint threat detection capabilities, the RSA Advanced SOC Solution is designed to help security teams quickly spot attacks that often go unnoticed by stand-alone log-centric SIEM, and traditional perimeter-based security tools, including anti-virus, firewalls and intrusion prevention systems.

Integrating technologies from RSA® Security Analytics, RSA® ECAT and RSA® Archer Security Operations Management as well as training and services from the RSA® Advanced Cyber Defense Practice, the new RSA Advanced SOC Solution delivers compliance and security requirements in one platform, empowering security teams to more effectively detect and respond to the most advanced attacks before they can impact the business. 

Complete Visibility & Deep Investigation

The RSA Advanced SOC Solution is engineered to collect detailed network, system and endpoint data to help both enable timely incident detection and direct security analysts to pivot instantly from suspected compromises to deep incident forensics and understand the true nature and scope of the issue. More than 400 network and log parsers perform capture time analysis of every log and network session to identify key threat indicators and extract metadata to lead security analysts to the most important issues. Prioritized investigations and analyst workflows help maximizes resources and empower security teams to quickly detect and remediate the highest risk threats. 

SIEM and Beyond

The RSA Advanced SOC Solution is designed to set a new market standard for SIEM capabilities by collecting and parsing 250+ event sources, leveraging 275+ out-of-the-box correlation rules, and approximately 100 report templates to keep up to date with current mandates.  Native incident response capabilities with aggregated alerts across data sources promote fast and granular investigations.   Providing visibility far beyond logs, the RSA Advanced SOC Solution also is engineered to correlate network packets, NetFlow, and endpoint data to provide visibility far beyond stand-alone SIEM, helping to eliminate blind spots and assisting in faster remediation of threats while meeting compliance requirements.

Real-time Endpoint Threat Detection

The addition of RSA® ECAT provides security teams with the ability to expose malware and other threats that have gone undiscovered by traditional anti-virus technologies. The new solution is engineered to quickly investigate and analyze suspicious endpoint activity and easily determines how widely any malware detected has spread through the enterprise. Detection happens automatically, in real-time and without the use of signatures. 

Modular Architecture

The RSA Advanced SOC Solution is designed to allow scalable growth based on customers' current needs and resources while also helping them create a platform to address future requirements.  Whether implementing the full solution or looking to augment existing tools, the solution is engineered to help organizations immediately advance their current security practices to combat even the most advanced threats.

RSA CUSTOMER QUOTE:

Bob Cheong, Chief Information Security Officer, Los Angeles World Airports 

"The RSA Security Operations Solution offers a powerful combination of forensic analysis and endpoint malware detection that provides my team with strong visibility, deep-dive analysis and improved detection so we can quickly respond to external and insider threats before they can damage our business.  By having these tools in our arsenal we more thoroughly understand our security posture, which gives us the added confidence to implement new IT innovations to help the business better serve our customers."

ANALYST QUOTE:

Jon Oltsik, Senior Principal Analyst, ESG

"Many organizations are struggling to balance security and business risk with new technology demands.  As next-generation technologies like cloud and mobile evolve into the norm, security tools and defensive techniques must keep pace protecting from the expanded risks.  Solutions that provide a more detailed view into what is happening on the network and also help prioritize security events can give organizations a significant time advantage to remediate the most pressing issues quickly."

RSA EXECUTIVE QUOTE:

Amit Yoran, Senior Vice President, RSA, The Security Division of EMC

"For years there has been a call for a fundamental shift in how we approach security, but to date the industry has returned incomplete answers. SIEM technologies help meet compliance requirements and offer a basic detection levels – but only for logs. Next-generation firewalls and malware detection tools provide greater visibility, but often without the analytics and incident response needed to turn raw data into actionable intelligence.  Today, RSA is delivering on the promise of next-generation security with a complete solution in one platform to address compliance and security needs. In the end, we are helping organizations evolve from being the hunted to being the hunter within their own networks and digital infrastructures."

ADDITIONAL RESOURCES:

AVAILABILITY

RSA Advanced Security Operations Center Solution will be generally available in Q3 2014.

ABOUT RSA

RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world's leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats. For more information, please visit www.EMC.com/RSA.

RSA and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries.  All other products and/or services referenced are trademarks of their respective companies. 

This release contains "forward-looking statements" as defined under the Federal Securities Laws. Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.'s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centers or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in the filings of EMC Corporation, the parent company of RSA, with the U.S. Securities and Exchange Commission. EMC and RSA disclaim any obligation to update any such forward-looking statements after the date of this release.

 

SOURCE RSA

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
In his session at Cloud Expo, Alan Winters, U.S. Head of Business Development at MobiDev, presented a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to maximize project result...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abilit...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
In his session at @ThingsExpo, Arvind Radhakrishnen discussed how IoT offers new business models in banking and financial services organizations with the capability to revolutionize products, payments, channels, business processes and asset management built on strong architectural foundation. The following topics were covered: How IoT stands to impact various business parameters including customer experience, cost and risk management within BFS organizations.
Recently, REAN Cloud built a digital concierge for a North Carolina hospital that had observed that most patient call button questions were repetitive. In addition, the paper-based process used to measure patient health metrics was laborious, not in real-time and sometimes error-prone. In their session at 21st Cloud Expo, Sean Finnerty, Executive Director, Practice Lead, Health Care & Life Science at REAN Cloud, and Dr. S.P.T. Krishnan, Principal Architect at REAN Cloud, discussed how they built...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...