The GSN 2015 Digital Yearbook
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
RSA, <strong>The</strong> Security Division of EMC<br />
<strong>2015</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Big Data Analytics Solution<br />
Name of Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA Security Analytics<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>The</strong> application of Big Data Analytics/Data Science<br />
techniques to the challenge of IT security is in its early<br />
stages, but what is clear given the seemingly unending<br />
stream of major breaches, is that what the security<br />
industry is doing today isn’t working. A new approach<br />
to IT security is needed. A key challenge is that the<br />
detection of what can be very subtle and targeted attacks<br />
is nearly impossible with the signature, perimeter,<br />
and log/SIEM dependent security systems that are most<br />
prevalent today. <strong>The</strong> attraction of Big Data Analytics<br />
and its associated Data Science techniques are that they<br />
provide capabilities that are most in need to address<br />
today’s security challenges, namely the ability to ingest<br />
and manipulate a very large and diverse set of data<br />
from across an enterprise, over a long time horizon,<br />
and apply analytic techniques to it which are tuned to<br />
finding subtle signals of an attack amongst the everyday<br />
normal activity of the organization. Attackers have<br />
learned to hide in plain sight and move low-and-slow to<br />
remain undetected. By using Data Science models with<br />
the right data, one can shine a light on this activity. RSA<br />
Security Analytics deserves to win this award because<br />
it uniquely combines the ability to collect, ingest and<br />
make sense out of large amounts of internal telemetry<br />
– logs, events, full network traffic, netflow, endpoint<br />
activity, IT asset, identity, and other business context<br />
and combine it with external threat intelligence to<br />
massively increase the security visibility of the organization.<br />
To this data RSA Security Analytics applies multiple<br />
detective analytic techniques, including those based<br />
74