The GSN 2015 Digital Yearbook
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
RSA, <strong>The</strong> Security Division of EMC<br />
<strong>2015</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Endpoint Detection and Response Solution<br />
Name of Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA ECAT<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA President Amit Yoran said “IT Security has Failed.”<br />
Organizations across a wide range of industries are<br />
breached, new malware, zero-day vulnerabilities are<br />
everywhere. Money, intellectual-property, hacktivism<br />
are only a few of the reasons. <strong>The</strong>y are bombarded with<br />
crimeware, adware, targeted campaigns, and nationstate<br />
attacks. Attackers today can easily bypass traditional<br />
signature-based defenses, create persistency, move<br />
laterally, exfiltrate data while leaving organizations blind<br />
from those types of threats that will put their name on<br />
the first page of today’s news. RSA does not believe in<br />
this status quo! How is RSA ECAT doing things differently?<br />
ECAT is an endpoint threat detection and response<br />
solution focused on malware and other threats’ behavioral<br />
detection, able to provide visibility to how wide-<br />
spread an attack is and instantly determine the scope<br />
and mitigate in real-time. Analysts trust ECAT to identify<br />
both the known and unknown zero-day malware based<br />
on its behavioral-based detection capabilities.<br />
RSA ECAT’s approach provides:<br />
• Behavioral modeling via ECAT’s Instant Indicator of<br />
Compromise (IIOC). ECAT provides an out-of-the-box<br />
list (~300) of IIOCs for both Windows and Mac operating<br />
systems, being able to identify the exact attack<br />
vector used by threats and generic behavior indicative<br />
of malware. Based on IIOCs triggered, a machine and<br />
module risk score are generated enabling analysts for<br />
better detection and prioritization capabilities. ECAT’s<br />
IIOCs expose the attack characteristics by pointing the<br />
72