Download PDF version Contact company

RSA, The Security Division of EMC Corporation, recently announced the release of RSA® Security Analytics – a transformational security monitoring and investigative solution designed to help organizations defend their digital assets against today’s most sophisticated internal and external threats. Built on the proven architecture of RSA NetWitness® technology, RSA Security Analytics fuses SIEM, Network Forensics, & Big Data analytics into a security platform that will be the cornerstone of next generation security operations centers.

Any intelligence-driven security program must begin with a comprehensive understanding of risk facing the organization. Current security technologies, including SIEM tools, often fall short in this area; they cannot provided deep enough visibility into today’s threats and often cannot scale to today’s analytic needs.

By providing security professionals with the visibility to see and understand vulnerabilities and attacks, RSA Security Analytics enables the discovery of risks as they occur, thus significantly cutting the time required for investigations from days to minutes. Furthermore, by helping security professionals understand digital risks originating from both inside and outside their enterprise, organizations can better defend business assets including intellectual property and other sensitive data while reducing the time and cost associated with threat management and compliance focused reporting.

The RSA Security Analytics Unified Platform delivers:

  • Quick Capture and Analysis — Security-relevant data, including full network packets, logs, and threat intelligence, are captured and quickly analyzed to speed up the detection of potential threats.
  • High Powered Analytics — Enables much larger-scale collection of data and empower new methods of than traditional siem-based approaches to security.
  • Integrated Threat Intelligence — Helps organizations operationalize the use of threat intelligence feeds to accelerate detection and investigations of potential attack tools and techniques targeting the enterprise.
  • Context for Threats — Through integrations with RSA GRC and RSA DLP, and by fusing data produced by other products, analysts can use business context to prioritize and allocate resources to the threats which pose the greatest risk.
  • Malware Identification — Using a variety of investigative techniques, the solution indentifies a much wider range of malware-based attacks.
  • Automates Compliance Reporting — Enables compliance as an outcome of good security practices.

The integration of proven Big Data platforms and analytic methods into security tools provide a significant advancement to how security is performed. RSA's Security Analytics bring together unparalleled leadership in visibility, leverages market leading big data platforms and advanced analytic methods capable of identifying high risk activities, advanced threat mitigation and meeting compliance objectives.

Download PDF version Download PDF version

In case you missed it

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Anviz transforms traditional property management into a smart reality, making digitisation more than just talk
Anviz transforms traditional property management into a smart reality, making digitisation more than just talk

The Middle East has recently expanded its real estate market as the region's economy grows and urbanisation accelerates. This trend has led to an increasing demand for smart securi...

Quick poll
Which feature is most important in a video surveillance system?