This supplier profile is not yet verified.
Verification is a free, simple process in which a supplier representative confirms the accuracy of their profile and identifies profile improvements.
XSelect a record to create:
Hardware Share the specifications and applications of your hardware portfolio with potential customers.
Software Share the capabilities and applications of your software portfolio with potential customers.
Protect your organization’s valuable digital assets with RSA Security Analytics. RSA Security Analytics lets security operations teams collect and analyze logs, network packets, NetFlow, and endpoint data. These capabilities enable SOC analysts to discover attacks that traditional log-centric security information and event management (SIEM) tools miss.At the time of collection, RSA Security Analytics uses Capture Time Data Enrichment to inspect every piece of data collected for threat indicators. Analysts have the ability to investigate rapidly down to the most granular detail. Your team can understand exactly what is happening and what to do about it.Deploy the full RSA Security Analytics product or choose what you need to complement tools that your security operations team already uses. Use cases include:- SIEM: log and NetFlow collection, correlation, archiving, incident management, compliance and security reporting- Network forensics and monitoring: full packet capture, correlation, Big Data analytics, deep dive investigations, incident management and response
Please select suppliers to compare via these checkboxes.