21.01.2016 Views

The GSN 2015 Digital Yearbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

on Big Data Analytics/Data Science, to surface security<br />

anomalies that are highly suggestive of advanced or<br />

targeted attacks. Our Data Science models use hundreds<br />

of indicators to identify activities such as beaconing and<br />

suspicious domain activity. No other security product<br />

on the market combines the capabilities of broad and<br />

deep, enterprise-wide, data collection, data enrichment,<br />

with the delivery of tested detective oriented, Data Science<br />

based algorithms which can be applied to a given<br />

organization with only modest customization. Some<br />

competitive products natively collect some of this data,<br />

but usually not the most important (network packets<br />

& endpoint activity data) sets, while other products<br />

collect no data at all and only provide an analytic platform,<br />

leaving the data collection as an exercise for the<br />

customer. Other products provide general purpose Big<br />

Data Analytics capabilities, but leave it to the organization<br />

and their own data scientists (which most security<br />

organization don’t have) to apply these general purpose<br />

tools to the security domain. RSA Security Analytics is<br />

a detective and investigative platform that was specifically<br />

designed for the security domain, provides its own<br />

native data collection and management capabilities for<br />

the data most likely to have the subtle signals of an attack,<br />

and marries this with analytic algorithms that were<br />

specifically designed by RSA’s security researchers and<br />

data scientists to aide in the detection of today’s most<br />

advanced and targeted attackers.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Security Analytics Home Page:<br />

http://www.emc.com/security/security-analytics/security-analytics.htm<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Chris Conway, Associate Account Executive<br />

CHEN PR, Inc.<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (781) 672-3113<br />

cell: (508) 212-4226<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cconway@chenpr.com<br />

75

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!