New approach to security

April 2013 Information Security

Stephan Le Roux, RSA District Manager Southern Africa
Stephan Le Roux, RSA District Manager Southern Africa

RSA, the security division of EMC, announced the release of RSA Security Analytics, a transformational security monitoring and investigative solution designed to help organisations defend their digital assets against today’s sophisticated internal and external threats. Built on the architecture of RSA NetWitness technology, RSA Security Analytics fuses SIEM, network forensics and big data analytics into a security platform that will be the cornerstone of next generation security operations centres.

Any intelligence-driven security program must begin with a comprehensive understanding of risk facing the organisation. Current security technologies, including SIEM tools, often fall short in this area; they cannot provide deep enough visibility into today’s threats and often cannot scale to today’s analytic needs.

By providing security professionals with the visibility to see and understand vulnerabilities and attacks, RSA Security Analytics is engineered to enable the discovery of risks as they occur, thus significantly cutting the time required for investigations from days to minutes. Furthermore, by helping security professionals understand digital risks originating from both inside and outside their enterprise, organisations can better defend business assets, including intellectual property and other sensitive data, while reducing the time and cost associated with threat management and compliance-focused reporting.

The RSA Security Analytics Unified Platform is designed to deliver:

* Quick Capture and Analysis - Security-relevant data, including full network packets, logs, and threat intelligence, are captured and quickly analysed to speed up the detection of potential threats.

* High Powered Analytics – Enables much larger-scale collection of data and empowers new analysis methods over that of traditional SIEM-based approaches to security.

* Integrated Threat Intelligence – Helps organisations operationalise the use of threat intelligence feeds to accelerate detection and investigations of potential attack tools and techniques targeting the enterprise.

* Context for Threats – Through integrations with the RSA Archer GRC platform and RSA Data Loss Prevention (DLP) suite, and by fusing data produced by other products, analysts can use business context to prioritise and allocate resources to the threats which pose the greatest risk.

* Malware Identification – Using a variety of investigative techniques, the solution identifies a much wider range of malware-based attacks.

* Automates Compliance Reporting – Helps enable compliance as an outcome of good security practices.

The integration of proven Big Data platforms and analytic methods into security tools provides a significant advancement to how security is performed. As built, the RSA Security Analytics platform brings together visibility, leverages Big Data platforms and advanced analytic methods capable of identifying high risk activities, advanced threat mitigation and meeting compliance objectives.

For more information contact EMC South Africa, +27 (0)11 581 0033, sonelia.dupreez@emc.com, www.EMC.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.