Skip navigation
All Places > Products > RSA enVision > Blog > Author: Matthew Gardiner

RSA enVision

5 Posts authored by: Matthew Gardiner Employee

One of the key themes of the upcoming RSA Global Summit is how best to build up as well as out a security operations center (SOC).  This is not an easy task as it requires, more so than any other area of IT or IT security, the seamless marriage of the classic triad of people, processes, and technology.  Once an organization starts to recognize the need for systematic improvement in their incident detection and response, they come to recognize that technology generally is the least hard part of the equation.  In fact the building up and out of an organization’s SOC often coincides with their recognition that there is no such thing as a security “magic box”.  What is needed is a balanced approach where the technology both maximizes the efficiency and effectiveness of the SOC analysts as well as helps drive, prioritize, and maximize the continual processes that make up an organization’s incident detection, investigative, and remediation program.  The bottom line for this blog entry is if you want to engage deeper into this conversation in support of building up and out your organization’s SOC, plan to attend RSA’s Global (user) Summit this September 9-11. http://globalsummit.rsa.com/?utm_campaign=redirect&utm_source=blog&utm_medium=web

RATs are hard to deal with in part because they are small, scamper around generally unseen, and take your stuff without your knowledge.  Of course anyone in this product community who is reading this knows that I am talking about Remote Access Trojans and not the small mammals with small noses and big tails.  Computer RATs and the people that develop and use them are just as cunning as their furry namesakes, but are perhaps more dangerous.  There are many varieties of RATs out there (Hydraq, LURK, Sogu, Poison Ivy etc..), but in general they share many characteristics, such as they tend to be small and downloaded invisibly, delivered via an email attachment to an unsuspecting and sufficiently socially engineered user, typically enable user monitoring via keyloggers to steal the user’s credentials and other information, take screen shots of the host system for delivery to their master, install/delete software or reformat drives, not to mention “recruit” their hosts and others on the network into botnet armies.  In short, RATs can be extremely valuable to the bad guys and extremely annoying to you and your organization.  But how to detect and get rid of them? If you want to learn more about RATs and how to find and eradicate them from your environment, I encourage you to come and take part in our upcoming (early September in Washington DC) user conference, the RSA Global Summit.  There are two sessions that focus specifically on how to detect RATs, one by using RSA Security Analytics and its network-based visibility (Blind Spot Analysis – Finding RAT Communications Through Entropy and Analytics) and the other how to do it by leveraging RSA ECAT and its endpoint-level visibility (Catching the RAT with ECAT).  Both delivered by off-the-charts experts on the topic. Check out these sessions as well as dozens of others on the Summit registration site. http://globalsummit.rsa.com/?utm_source=regshare&utm_medium=social&utm_campaign=Global_Summit

IT Harvest's Richard Stiennon speaks with RSA's Matthew Gardiner about what incident response means today, why prevention is insufficient, and what capabilities are required to do it better, including the role of a CIRC or SOC. http://youtu.be/CtC_pwtKX18

IT-Harvest's Richard Stiennon speaks with RSA's Christina Jasinski about why traditional SIEM tools can't keep up with today's advanced threats and how RSA Security Analytics can provide the context and analytical capabilities required for incident detection and investigation. http://youtu.be/BOXnPDU7VFI

The security market in general and the SIEM market in particular have changed.  We can’t go back.  The ever expanding IT surface area and attacker sophistication have seen to that.  Organizations are increasingly recognizing that traditional preventive security controls, especially those that are perimeter and signature-based, are no longer sufficient.  Logically this has led organizations to more closely examine their detective security controls to mitigate the weaknesses with their preventive ones.

 

Which brings us back to SIEMs in general and RSA enVision in particular.  SIEMs which exclusively depend on logs/events and correlative analysis for visibility and intelligence have a limited security role to play in detecting and investigating today’s most sophisticated attacks.  RSA recognized this trend many years ago and has been investing accordingly ever since.  One of our most key product innovations in response to this was the release of RSA Security Analytics a little more than a year ago.  If you haven’t seen or read about RSA Security Analytics please start to familiarize yourself.  There is no product on the market which compares with the level of visibility and context that it provides to accelerate the detective and investigative work of security analysts or incident responders.

 

We have been investing heavily in Security Analytics for several years and believe we have a fantastic product, and encourage customers to migrate from enVision to Security Analytics to get:

 

• A single platform for log & network security monitoring

• Superior real-time & after-the-fact analysis

• Contextual business and IT data, incident response, & endpoint visibility

• Operationalized threat intelligence

• A security platform where compliance is an outcome of security, not the other way around

 

RSA has extensive support, services, product, and sales resources to help you in this transition.  We thus encourage you to reach out to your RSA Sales or Channel Partner team immediately to have them help you move your SIEM program forward.  We would be happy to take any questions you have as well.  Just “comment” on this blog or open up a new “discussion” in this community.

 

To learn more about Security Analytics, please check out the product web site:

 

RSA Security Analytics

 

To learn about the transition from envision to Security Analytics please check out this video on youtube that was delivered as part of our most recent RSA Summit:

 

Transitioning From RSA enVision to RSA Security Analytics - YouTube

 

RSA Security Analytics Summit 2013 Presentations

 

To see the most current RSA enVision primary support dates check out this page:

 

RSA enVision Support