Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections

RSA announcement roundup: RSA and Juniper unveil new security wares

  • Print
  • Share
  • Comment
  • Save

EMC-owned IT-security firm RSA made a series of announcements on day-one of its annual conference in San Francisco Monday.

 

It started with three new software solutions for security operations centers. They were the Advanced Incident Management for Security (AIMS) software, Asset Criticality Intelligence (ACI) and Data Discovery for Security Analytics.

 

AIMS helps add a broader incident-management layer to RSA's Security Analytics. This improves the ability to track progress and engage key stakeholders during a security-incident investigation.

 

ACI is designed to provie business context of IT assets to security teams. The capability helps them prioritize response based on business value of each asset.

 

The new Data Discovery for Security Analytics was designed to provide risk intelligence and identify sensitive data in complex IT environments. It helps determine potential severity of breaches and prioritize incident response.

 

RSA also announced availability of its NextGen Security Operations Center services. The services help clients build core foundations for security operations, integrating new security analytics, threat intelligence, incident response and asset critical capabilities.

 

The service gives clients access to highly trained security practitioners, which provide services tailored to each individual organization.

 

Juniper launched a series of next-generation security products for data center environments at the conference, fortified by its new Junos Spotlight Secure intelligence service. The service provides intelligence about threats, attackers and individual devices across networks.

 

This is a cloud-based intelligence service, which, according to Juniper, provides more information about attackers than relying simply on IP addresses, as current reputation feeds do. It creates a “fingerprint” of attacker devices based on more than 200 unique attributes and provides precision blocking of attackers, while avoiding blocking valid users.

 

Also included in Juniper's announcement were Junos WebApp Secure – a protection solution for web applications, SRX Series Services Gateway integrated with WebApp Secure and Junos DSoS Secure. Both the SRX gateway and WebApp Secure are the first products to use Spotlight Secure intelligence.

 

 

Related images

  • An RSA SecurID authentication token

Have your say

Please view our terms and conditions before submitting your comment.

required
required
required
required
required
  • Print
  • Share
  • Comment
  • Save

Webinars

  • Live Customer Roundtable: Optimizing Capacity (12:00 EST)

    Tue, 8 Sep 2015 16:00:00

    The biggest challenge facing many data centers today? Capacity. How to optimize what you have today. And when you need to expand, how to expand your capacity smarter. Learn from the experts about how Data Center Infrastructure Management (DCIM) and Prefabricated Modular Data Centers are driving best practices in how capacity is managed and optimized: - lower costs - improved efficiencies and performance - better IT services delivered to the business - accurate long-range planning Don;t miss out on our LIVE customer roundtable and your chance to pose questions to expert speakers from Commscope, VIRTUS and University of Montana. These enterprises are putting best practices to work today in the only place that counts – the real world.

  • Power Optimization – Can Your Business Survive an Unplanned Outage? (APAC)

    Wed, 26 Aug 2015 05:00:00

    Most outages are accidental; by adopting an intelligent power chain, you can help mitigate them and reduce your mean-time to repair. Join Anixter and DatacenterDynamics for a webinar on the five best practices and measurement techniques to help you obtain the performance data you need to optimize your power chain. Register today!

  • Power Optimization – Can Your Business Survive an Unplanned Outage? (Americas)

    Tue, 25 Aug 2015 18:00:00

    Most outages are accidental; by adopting an intelligent power chain, you can help mitigate them and reduce your mean-time to repair. Join Anixter and DatacenterDynamics for a webinar on the five best practices and measurement techniques to help you obtain the performance data you need to optimize your power chain. Register today!

  • Power Optimization – Can Your Business Survive an Unplanned Outage? (EMEA)

    Tue, 25 Aug 2015 14:00:00

    Most outages are accidental; by adopting an intelligent power chain, you can help mitigate them and reduce your mean-time to repair. Join Anixter and DatacenterDynamics for a webinar on the five best practices and measurement techniques to help you obtain the performance data you need to optimize your power chain. Register today!

  • 5 Reasons Why DCIM Has Failed

    Wed, 15 Jul 2015 10:00:00

    Historically, DCIM systems have over-promised and under-delivered. Vendors have supplied complex and costly solutions which fail to address real business drivers and goals. Yet the rewards can be vast and go well beyond better-informed decision-making, to facilitate continuous improvement and cost savings across the infrastructure. How can vendors, customers and the industry as a whole take a better approach? Find out on our webinar on Wednesday 15 July.

More link