21.01.2016 Views

The GSN 2015 Digital Yearbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

RSA, <strong>The</strong> Security Division of EMC<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Big Data Analytics Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Security Analytics<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> application of Big Data Analytics/Data Science<br />

techniques to the challenge of IT security is in its early<br />

stages, but what is clear given the seemingly unending<br />

stream of major breaches, is that what the security<br />

industry is doing today isn’t working. A new approach<br />

to IT security is needed. A key challenge is that the<br />

detection of what can be very subtle and targeted attacks<br />

is nearly impossible with the signature, perimeter,<br />

and log/SIEM dependent security systems that are most<br />

prevalent today. <strong>The</strong> attraction of Big Data Analytics<br />

and its associated Data Science techniques are that they<br />

provide capabilities that are most in need to address<br />

today’s security challenges, namely the ability to ingest<br />

and manipulate a very large and diverse set of data<br />

from across an enterprise, over a long time horizon,<br />

and apply analytic techniques to it which are tuned to<br />

finding subtle signals of an attack amongst the everyday<br />

normal activity of the organization. Attackers have<br />

learned to hide in plain sight and move low-and-slow to<br />

remain undetected. By using Data Science models with<br />

the right data, one can shine a light on this activity. RSA<br />

Security Analytics deserves to win this award because<br />

it uniquely combines the ability to collect, ingest and<br />

make sense out of large amounts of internal telemetry<br />

– logs, events, full network traffic, netflow, endpoint<br />

activity, IT asset, identity, and other business context<br />

and combine it with external threat intelligence to<br />

massively increase the security visibility of the organization.<br />

To this data RSA Security Analytics applies multiple<br />

detective analytic techniques, including those based<br />

74

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!