Despite increasing investments in security, attacks and breaches continue at an alarming rate. Web and mobile applications are key areas where attackers invest their time and resources to understand and target organizational vulnerabilities.
“Victorious warriors win first and then go to war; defeated warriors go to war first and then seek to win.”
― Sun Tzu, The Art of War
Over the past several years, the cybercrime marketplace has gone through a significant maturation process, achieving parity of sophistication with many of the world’s legitimate markets. Traditional business differentiators such as customer service have migrated to the underground—if the stolen credit card you just bought has been cancelled, you’ll get a refund. Business concepts such as innovate-to-stay-ahead are commonplace amongst cybercrime-as-a-service vendors. This activity, in turn, has generated a lot of noise when it comes to threat intelligence; noise that is making it more difficult for us to distinguish the real threat signal. What is the risk of a single phishing or malware attack? What threat does a conversation between a couple fraudsters about cash out methods pose to your organization? There is just too much noise.
Today, RSA is excited to announce a new product suite we call RSA Via. It has three main components and comes with a provocative claim: it’s one of the first smart identity solutions to protect from the endpoint to the cloud.
RSA Via brings together three components of identity and access management (IAM) that have traditionally been run as separate silos, and is engineered to do so in a differentiated, connected, “smart” way:
Organizations continue to invest in traditional log-centric SIEM tools without seeing the benefits that they have been promised. Sure, most SIEMs do a fine job of log collection, management and compliance reporting, but the outcome every enterprise wants – and wanted all along – is to detect and respond to the most lethal threats that can evade their security controls.
RSA Security Analytics is what SIEM was meant to be – superior threat detection and investigation.
Time and time again, traditional log-centric SIEMs have failed to properly protect organizations against attacks, especially advanced or targeted attacks. According to the 2014 Verizon Data Breach Investigation Report 99% of successful cyber-espionage attacks went undiscovered by logs. At RSA, we’re not surprised by this statistic. While log analysis can add value, by themselves logs alone are simply not enough to provide visibility to a determined threat. As your IT environment now spans from the endpoint to the cloud, so should your visibility. After all: you cannot stop what you cannot see.
Protection 1 is one of the nation’s largest full service security companies. We protect residences and businesses around the clock, around the country.
I like to think that we’re no different from any other IT organization in this: we have two primary imperatives to meet. The first is the business mandate: Be Available Always. Since we’re in the life-saving business, that’s especially important to us. The second is the technology mandate: Do More with Less.