As we gather in Amsterdam for RSA Conference Europe, I am reminded about what an incredible journey 2013 has been. We kicked off the year with the global launch of RSA Security Analytics, which has proven to be a truly game-changing solution in the SIEM/centralized security monitoring space. RSA Security Analytics is helping to transform the entire SIEM category, by helping our customers to both improve their defenses against advanced threats AND to address their compliance and long-term retention requirements.
Today, we take the next step in this journey. RSA is announcing a combination of new products and services designed to help organizations develop and mature their security operations and accelerate their incident response.
Building an intelligence-driven security organization will be a game changer for organizations struggling with defending against cyber attacks and intrusions. The launch of RSA Security Analytics earlier this year was a big step in our mission to help customers address these challenges at the network level and today we take another step forward for endpoint threat detection with the launch of RSA ECAT V.3.5.
We all see the headlines every day — cyber-attacks, cybercriminals, targeted attacks, state-sponsored hackers – there is a never-ending pipeline of governments, enterprises and other organizations that have been compromised. Trying to secure the dissolving perimeter of a modern enterprise, and using signature-based technology such as anti-virus to detect advanced threats, is fighting yesterday’s battle with antiquated weapons. Today CISOs need to work on the assumption that with the hyper-connectivity and increased openness of IT infrastructures, they will have to defend against threats from inside their networks, not at some mythical perimeter. That means putting in place the tools to identify intrusions, spot even the faintest signs of attack, and act before damage is done.
A little more than 7 months ago, Silver Tail Systems became a part of EMC and our innovative solution for web session intelligence helped to round out the already-robust RSA enterprise security portfolio. We are incredibly proud of our accomplishments and, as a part of RSA, we have been able to focus our efforts on continued innovation to help customers combat online threats such as business logic abuse and the latest generation of DDoS attacks. Today is particularly exciting for me because we are launching a major update to our RSA Silver Tail web threat detection solution. The RSA Silver Tail 4.0 solution is designed to leverage the power of Big Data to help security and fraud teams visualize and quickly analyze millions of user web-session activities to identify fraud, security threats and business logic abuse in real-time.
The release is a culmination of 18 months of efforts on two fronts, analytics and user experience. On one front, our analytics team of statisticians, threat researchers, and software engineers has taken our population-based modeling to an entirely new level by building it into a real-time analytics engine, Streaming Analytics. On the second front, we made a large investment in the user interface, employing UX research and visual designers to build a UI that applies successful concepts from consumer UIs to the world of enterprise security software.
We had a significant challenge ahead of us in engineering the RSA Silver Tail 4.0 solution to not only live up to the innovative heritage of Silver Tail Systems, but also to take full advantage of the opportunity to deliver on a global stage — and RSA Silver Tail 4.0 technology hits the mark at every level.
Our goal was to set a new bar for the Web session intelligence market and radically change the way security and fraud teams conduct their jobs. Building on RSA’s focus on risk-based intelligence, RSA Silver Tail technology takes a Big Data approach to combat the most sophisticated online attacks. The intelligent user interface is engineered to include dynamic visualizations that empower investigators to quickly view and analyze the activities of millions of concurrent Web sessions. We designed the new “Incidents” functionality to give security and fraud teams one-click investigation capabilities, as well as efficient visibility into activity on their website. Finally, we’ve added Streaming Analytics — featuring in-memory click-by-click threat scoring — to deliver advanced real-time attack discovery and mitigation.
We are extremely excited to launch RSA Silver Tail 4.0 technology. It’s been an incredible experience for the team to execute on a vision that directly addresses customer feedback and real-world customer needs – like combating the most prevalent and advanced web threats including Denial-of-Service and business logic abuse. As we continue to widen the gap between RSA Silver Tail and potential competitors, we realize that we’re just unearthing the abundant possibilities as we begin to leverage the profound power and reach of RSA and our collective product families.
The world we live in today is the result of an evolution that started back in they days of the “Moonlight Maze” attacks in the late 1990s. What the security community has come to realize over the past decade is that the advanced threat is not just a phenomenon isolated to critical government systems, nor is it simply a matter of “one and done” attacks that have a single intent. In our highly connected world, nearly any company can be the focus of sophisticated, determined attacks, whether for the digital information they possess, or as a stepping stone to another target somewhere else in their digital supply chain. This is why we’ve created the RSA Next Generation Security Operations Center (SOC) design and implementation services approach.
The opinions and interests expressed on Dell EMC employee blogs are the employees' own and do not necessarily represent Dell EMC's positions, strategies or views. Dell EMC makes no representation or warranties about employee blogs or the accuracy or reliability of such blogs. When you access employee blogs, even though they may contain the Dell EMC logo and content regarding Dell EMC products and services, employee blogs are independent of Dell EMC and Dell EMC does not control their content or operation. In addition, a link to a blog does not mean that EMC endorses that blog or has responsibility for its content or use.