RSA News: Tenable Enhances PlatformRoundup of News from Security Solutions Providers Attending RSA 2014
Tenable Network Security announces that it has enhanced its SecurityCenter Continuous View platform with integrated threat management, improving security workflows and empowering users to locate vulnerabilities, perform forensic analysis and respond immediately to incidents.
See Also: Live Webinar | Breaking Down Security Challenges so Your Day Doesn’t Start at 3pm
The latest version adds new analysis capabilities, including the ability to pivot from vulnerability to threat data sources for instant incident response. The new model allows administrators to define user owners for monitored assets, and provides user-specific reports/dashboards to aid in forensic analysis.
For more information, visit Tenable Network Security.
Splunk to Showcase 20 Security-Related Demonstrations
Splunk Inc. will showcase more than 20 security-related demonstrations of Splunk software at RSA Conference 2014. Splunk security experts will be on hand at booth number 2835 to conduct live demonstrations and answer questions at the show. The demonstrations cover a wide range of use cases including investigating incidents, detecting advanced threats and improving security and compliance posture. In addition, Splunk security evangelist Joe Goldberg will present on how to use big data to help counteract advanced threats. Highlighted Splunk software being publicly showcased at RSA Conference USA 2014 includes:
- Enterprise Security App: provides out-of-the-box security content that delivers a beyond-SIEM security intelligence platform, helping customers detect known and unknown threats.
- Palo Alto Networks App: shortens the time to detection and remediation of advanced threats, including automated incident response for compromised hosts.
- Cisco Security Suite App: ingests the context-rich machine data from a variety of Cisco security products to enable organizations to analyze risk, improve security posture and compliance and address a number of additional operational and regulatory concerns.
- Splunk Integration with Norse Live Threat Intelligence: Norse uses a global network of sensors to identify high-risk and malicious IP addresses, uncover more contextual information around these IP addresses and assign them a risk score. Norse then makes this information available in real-time through the cloud via its IPViking and Darklist services.
For more information, visit Splunk.
HID Global Showcasing End-to-End Solution Portfolio
HID Global will showcase an end-to-end solution portfolio designed to protect organizations against unauthorized access to everything from the cloud, to data and the door at this year's RSA Conference. In addition to demonstrating its range of multi-layer authentication and credential management solutions, the company's experience zones will feature solutions that address the specific needs of government, enterprise and financial markets.
Under the theme "Secure Access to Everything, Anywhere - Cloud, Data, Door," HID Global will demonstrate its credential management and authentication solutions from its ActivID portfolio, as well as products from its secure printing and physical access control offerings. Demonstrations will take place in booth number 3507 in the North Hall of the Moscone Center.
For more information, visit HID Global.
Trend Micro Adds Enhancements to Smart Protection Platform
Trend Micro announces the latest enhancements to the Trend Micro Smart Protection Platform, building upon a set of threat defense capabilities that already enable customers to protect their organization against known threats, yet also detect and respond to new targeted attacks.
The most notable enhancement is the all-new Trend Micro Smart Sensor solution, a context-aware endpoint monitoring solution that enables threat investigators to rapidly detect and assess the nature and extent of targeted attacks on endpoints and servers, speeding time to remediation. As opposed to focusing only on advanced threats, the Smart Protection Platform supports a complete cycle of protection across networks, endpoints and servers. With centralized visibility and control, correlated threat intelligence and flexible on premise or cloud deployment options, it also delivers more cost-effective and manageable capabilities.
For more information, visit Trend Micro.
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.