RSA looks to have SIEM do advanced real-time threat analysis, forensics

By , Network World |  Security, Forensics, RSA

RSA is readying a product it calls Security Analytics whose purpose is basically to transform the company's traditional security information and event management (SIEM) product, EnVision, into a hunter of stealthy attackers, and a forensics tool to analyze attacks.

Security Analytics is being beta-tested by RSA customers, including those in the financial services industry, according to Eddie Schwartz, vice president and chief information security officer at RSA. Schwartz says SIEM traditionally has been a tool oriented toward automating and centralizing collection of security and network logs, particularly for compliance purposes, but isn't always adept in real-time incident investigations. But he says RSA has come up with a way to use its SIEM for ad hoc investigations to find out how attackers may have infiltrated a network and what they did inside.

ANALYSIS: IT spending to grow despite economic woes, IDC says

"It's making SIEM more relevant to the threat landscape," says Schwartz. "A lot of organizations with SIEM have been subject to these spectacular data breaches, ourselves included."

In March 2011, RSA acknowledged a serious breach in which sensitive information related to its SecurID product was stolen by attackers who had the goal of attacking RSA customers, such as Northrop Grumman. RSA's own investigations led to conclude it had been attacked by a "nation-state" it wouldn't name, while other researchers have named China with confidence.

Security Analytics is meant to be the piece that acts as a front-end to combine data from the EnVision SIEM, as well as with other sources such as the RSA NetWitness network-monitoring product, in order to combine relevant data into a single view. Security Analytics can also take make use of data provided from non-RSA products, such as those from Bit9, ThreatGrid and iDefense, among others, says Schwartz. However, one of the things that's needed for the Security Analytics process to work well is "full-packet capture," he says.

Not every customer's network is secured the same way, of course, and there's going to be variations on how Security Analytics will be set up, Schwartz says.

There is no announced time frame for Security Analytics to ship.


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.

     

    Learn more

SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

Ask a Question