21.01.2016 Views

The GSN 2015 Digital Yearbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

RSA, <strong>The</strong> Security Division of EMC<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Endpoint Detection and Response Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA ECAT<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA President Amit Yoran said “IT Security has Failed.”<br />

Organizations across a wide range of industries are<br />

breached, new malware, zero-day vulnerabilities are<br />

everywhere. Money, intellectual-property, hacktivism<br />

are only a few of the reasons. <strong>The</strong>y are bombarded with<br />

crimeware, adware, targeted campaigns, and nationstate<br />

attacks. Attackers today can easily bypass traditional<br />

signature-based defenses, create persistency, move<br />

laterally, exfiltrate data while leaving organizations blind<br />

from those types of threats that will put their name on<br />

the first page of today’s news. RSA does not believe in<br />

this status quo! How is RSA ECAT doing things differently?<br />

ECAT is an endpoint threat detection and response<br />

solution focused on malware and other threats’ behavioral<br />

detection, able to provide visibility to how wide-<br />

spread an attack is and instantly determine the scope<br />

and mitigate in real-time. Analysts trust ECAT to identify<br />

both the known and unknown zero-day malware based<br />

on its behavioral-based detection capabilities.<br />

RSA ECAT’s approach provides:<br />

• Behavioral modeling via ECAT’s Instant Indicator of<br />

Compromise (IIOC). ECAT provides an out-of-the-box<br />

list (~300) of IIOCs for both Windows and Mac operating<br />

systems, being able to identify the exact attack<br />

vector used by threats and generic behavior indicative<br />

of malware. Based on IIOCs triggered, a machine and<br />

module risk score are generated enabling analysts for<br />

better detection and prioritization capabilities. ECAT’s<br />

IIOCs expose the attack characteristics by pointing the<br />

72

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!