RSA brings big data analytics to security threat management
Secure Analytics Unified Platform will let enterprises uncover threats much faster, company says
Computerworld - RSA has unveiled a new tool designed to let enterprises detect security threats more quickly than current technologies permit by combining big data management and analytics approaches with traditional network monitoring and threat detection.
The RSA Security Analytics Unified Platform is built around the company's existing NetWitness threat detection architecture. It lets companies capture and analyze massive amounts of structured and unstructured data to speed up threat detection.
The new platform is comprised of a data capture infrastructure and a separate security analytics warehouse. The capture component consists of network appliances for collecting, normalizing and analyzing massive volumes of network packets and log data; an "analytics concentrator" that aggregates metadata from the appliances; and an analytics "broker" that provides a single access point for running queries across multiple brokers.
The security analytics warehouse itself is Hadoop-based and allows companies to store and stage petabytes worth of structured and unstructured data. The warehouse supports long-term data archiving, forensics and analysis, says RSA, the security division of EMC.
Unlike traditional security incident and event management products that are log-centric in nature, RSA's Security Analytics platform supports full network packet capture and network session deconstruction as well, said Paul Stamp, director of product marketing at RSA.
It lets security administrators gather and look at petabytes worth data from multiple vantage points to uncover threats that are very hard to discover using existing security tools.
"This is a responsive technology. It's about new detection capabilities," Stamp said. It's about starting to narrow the gap between when an attack is detected and when the attack happened, he added.
RSA's technology is among an emerging class of security products attempting to use big data management and analytics approaches to address security problems. Other companies, including IBM, HP, Symantec and Trend Micro, are working on similar products.
Like big data analytics tools in other IT environments, the security products are designed to let administrators run queries against extremely large and varied data sets to uncover threat patterns that would otherwise have remained hidden.
Many security analysts and practitioners say that the need for such tools is growing. They are convinced that unless there's a better way for security organizations to ingest and analyze the gigabytes and even terabytes worth of security log and network event data generated daily inside companies, there's no way to fight emerging threats.
Existing signature-based security tools fail to provide a complete picture of threats that may be lurking inside a network because they are fixed function and designed to look only at narrow set of parameters, said Jon Oltsik, an analyst with the Enterprise Security Group. "None of the tools can take in multiple data feeds and then give you the ability to query the data," to look for hidden threats, Oltsik said. Such a capability is crucial at a time when attacks are becoming increasingly sophisticated, targeted and hard to detect, he said.
BI and analytics
- Big data key to bringing hyperlocal weather forecasts to Georgia farmers
- Brewer taps Bud Lab at University of Illinois
- Splunk woos Hadoop users
- RSA brings big data analytics to security threat management
- Moving beyond Hadoop for big data needs
- Q&A: What's needed to get a big data job?
- SAS extends analytics support for unstructured data
- Time has come for chief analytics officers
- Big data brings big academic opportunities
- Finding the business value in big data is a big problem
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- IPv6 Fundamentals IPv6 is needed to sustain the growth of the Internet. The transition from IPv4 will require planning and likely some degree of support...
- Optimize IT Performance & Availability: Four Steps to Establish Effective IT Management Baselines More than ever before, your company's ability to grow hinges on IT performance and availability. Download this how-to report on establishing IT baselines,...
- Considerations for Embracing Wireless Monitoring Employee behavior is once again driving major changes for IT departments - this time it's BYOD. This report details three critical steps to...
- Live Webcast Master the Changing SAP Landscape with Performance Management SAP landscapes are not getting simpler. Gradually, business processes that used to be contained on a single SAP system now involve a range...
- Accelerate your innovation with IBM Bluemix™ Join us for a webcast introducing the new IBM BluemixTM. IBM Bluemix (www.bluemix.net) is a developer oriented Platform as a Service (PaaS) environment...
- On-Demand Webinar: Beyond the Enterprise App Store If you already have a few projects that are RED on your project timeline then join us so you can free up your... All Applications White Papers | Webcasts