• RSA IoT Security Montior: Edge Monitoring & Analytics for IoT

    This latest whitepaper from RSA Labs discusses how edge monitoring can be combined with advanced analytics to address some of the security challenges posed by the Internet of Things.
    Kevin Bowers
    last modified by Kevin Bowers
  • Project Iris Frequently Asked Questions

    What is Project Iris? Project Iris brings visibility and threat detection to the IoT edge. Project Iris uses statistical techniques and machine learning to flag anomalous behavior occurring on edge...
    Naveen Sunkavally
    last modified by Naveen Sunkavally
  • Project Syn Frequently Asked Questions

    What is Project Syn? Project Syn extends the capabilities of RSA Netwitness to provide runtime visibility and threat detection to Docker containers. Project Syn uses statistical techniques and machine learning to...
    Naveen Sunkavally
    last modified by Naveen Sunkavally
  • Project Notus - Concept Definition

      The promise of IoT is to gather data, and the data becomes actionable by applying analytics. Business and process decisions are then made, based on data. It is therefore critical to: Verify (authenticate) the...
    Riaz Zolfonoon
    last modified by Riaz Zolfonoon
  • Project Iris - Concept Definition

    The Internet of Things (IoT) promises an unprecedented connectivity that creates both tremendous opportunity and considerable risk. According to Gartner, the total number of IoT endpoints will reach 21B units by 2020....
    Riaz Zolfonoon
    last modified by Riaz Zolfonoon
  • Project SYN - Concept Definition

    Visibility and behavior analytics into a rapidly emerging cloud and data center architecture PROBLEM STATEMENT The data center threat surface area is growing exponentially, caused by “non-traditional&...
    Todd Morneau
    last modified by Brian Girardi
  • What's This File? - Concept Definition

    Multi-scanner-like cloud service to provide unique malware classification via deep learning and fuzzy-hashing PROBLEM STATEMENT R&D in security demands inbound intelligence from the product install base, and...
    Todd Morneau
    last modified by Brian Girardi