RSA offers Security Analytics as tool for detecting threats

RSA, the security division of EMC, today announced Security Analytics, its tool for real-time analysis of large amounts of data from security and business information to determine if an organization is being attacked, especially by stealthy threats intent on stealing sensitive information.

According to Paul Stamp, director of product marketing, Security Analytics combines technology from RSA's former threat-detection product NetWitness used in conjunction with the RSA security-event and information management product, enVision. The open-source Hadoop database is another component in Security Analytics that companies with massive amounts of data would use for threat-detection purposes.

[Background: IBM Security tool can catch insider threats, fraud]

The RSA announcement comes on the heels of a similar one from IBM related to its IBM Security Intelligence with Big Data tool, which also makes use of Hadoop.

Stamp says RSA's approach in Security Analytics, which is sold as an appliance, is flexible to allow capture of packet data and log information to be analyzed for security purposes. He says it's not mandatory that the RSA SIEM be used other SIEM products would be expected to work in RSA's approach but he advised use of enVision for "better functionality."

The Security Analytics tool starts at $70,000.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail: emessmer@nww.com.

Read more about wide area network in Network World's Wide Area Network section.

Tags: applications, security, IBM, Big Data; RSA; IBM, IPS, software, data mining, intel, emc, IDS

Today's Approach to Security is Broken

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Enterprise Security for Endpoints

Think your endpoints are secure? Think again. Learn why Trend Micro can help.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.