RSA brings big data analytics to security threat management
Secure Analytics Unified Platform will let enterprises uncover threats much faster, company says
Computerworld - RSA has unveiled a new tool designed to let enterprises detect security threats more quickly than current technologies permit by combining big data management and analytics approaches with traditional network monitoring and threat detection.
The RSA Security Analytics Unified Platform is built around the company's existing NetWitness threat detection architecture. It lets companies capture and analyze massive amounts of structured and unstructured data to speed up threat detection.
The new platform is comprised of a data capture infrastructure and a separate security analytics warehouse. The capture component consists of network appliances for collecting, normalizing and analyzing massive volumes of network packets and log data; an "analytics concentrator" that aggregates metadata from the appliances; and an analytics "broker" that provides a single access point for running queries across multiple brokers.
The security analytics warehouse itself is Hadoop-based and allows companies to store and stage petabytes worth of structured and unstructured data. The warehouse supports long-term data archiving, forensics and analysis, says RSA, the security division of EMC.
Unlike traditional security incident and event management products that are log-centric in nature, RSA's Security Analytics platform supports full network packet capture and network session deconstruction as well, said Paul Stamp, director of product marketing at RSA.
It lets security administrators gather and look at petabytes worth data from multiple vantage points to uncover threats that are very hard to discover using existing security tools.
"This is a responsive technology. It's about new detection capabilities," Stamp said. It's about starting to narrow the gap between when an attack is detected and when the attack happened, he added.
RSA's technology is among an emerging class of security products attempting to use big data management and analytics approaches to address security problems. Other companies, including IBM, HP, Symantec and Trend Micro, are working on similar products.
Like big data analytics tools in other IT environments, the security products are designed to let administrators run queries against extremely large and varied data sets to uncover threat patterns that would otherwise have remained hidden.
Many security analysts and practitioners say that the need for such tools is growing. They are convinced that unless there's a better way for security organizations to ingest and analyze the gigabytes and even terabytes worth of security log and network event data generated daily inside companies, there's no way to fight emerging threats.
Existing signature-based security tools fail to provide a complete picture of threats that may be lurking inside a network because they are fixed function and designed to look only at narrow set of parameters, said Jon Oltsik, an analyst with the Enterprise Security Group. "None of the tools can take in multiple data feeds and then give you the ability to query the data," to look for hidden threats, Oltsik said. Such a capability is crucial at a time when attacks are becoming increasingly sophisticated, targeted and hard to detect, he said.
BI and analytics
- Brewer taps Bud Lab at University of Illinois
- Splunk woos Hadoop users
- RSA brings big data analytics to security threat management
- Moving beyond Hadoop for big data needs
- Q&A: What's needed to get a big data job?
- SAS extends analytics support for unstructured data
- Time has come for chief analytics officers
- Big data brings big academic opportunities
- Finding the business value in big data is a big problem
- IT-centric enterprise BI models unsustainable, says Forrester
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Big Data Opportunity for HR and Finance If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
- The Value of IBM InfoSphere BigInsights The IBM® InfoSphere® BigInsights™ software platform helps firms discover and analyze business insights hidden in large volumes of a diverse range of data....
- Hadoop for Dummies Today, organizations in every industry are being showered with imposing quantities of new information. Along with traditional sources, many more data channels and...
- The Top Five Ways to Get Started with Big Data Despite the increased focus on big data over the past few years, most organizations are still talking about what big data is rather...
Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics
Date: May 6th, 2014
Time: 1 PM EDT
Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers to examine all...
- Big Data and Analytics will transform your business - what you don't know will hurt you! Feedback from over 23,000 actual Oracle big data and analytics (BDA) customers was analyzed by Solitaire Interglobal Ltd (SIL) and their findings are... All Big Data White Papers | Webcasts