RSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management Platform for Security and Compliance Success Eoin Thornton Senior Security Architect Zinopy Security Ltd. Changing Threats and More Demanding Regulations External attacks Malicious insiders taking financial info Data Center Careless users leaking IP R&D Costly audit requirements DMZ Executive Ever‐changing business requirements Financial New Web 2.0 and P2P technologies IT Staff Feels the Pressure Security team lacks visibility into the IT environment. Compliance is costly and resource‐intensive. Overwhelming to process raw log and event volume. Real‐time security posture is difficult to understand. Issues and Needs Security team cannot see into the IT environment. Non‐intrusive log collection to access all event sources. Overwhelming to process raw Complete information lifecycle log and event volume. management process. Real‐time security posture is difficult to understand. Real‐time risk‐based prioritization of events. Compliance is time‐ consuming. Compliance reports in minutes not weeks. RSA enVision 3‐in‐1 SIEM Platform Simplifying Compliance Enhancing Security Optimizing IT & Network Operations Compliance reports for regulations and internal policy Real‐time security alerting and analysis IT monitoring across the infrastructure Reporting Forensics Auditing Purpose‐built database (IPDB) security devices Alert / correlation Network baseline Visibility RSA enVision Log Management platform network devices applications / databases servers storage Simplifying Compliance Robust Alerting & Reporting 1400 reports+ included out of the box Easily customizable Grouped according to standards, e.g. National Laws (SOX, Basel II, JSOX), Industry Regulations (PCI), Best Practices & Standards (ISO 27002, ITIL) Enhancing Security Support the 3 key aspects of Security Operations Turn real time Turn real time events, e.g. threats, events, e.g. threats, into actionable data into actionable data Create a closed‐loop Create a closed‐loop incident handling incident handling process process Report on Report on the effectiveness the effectiveness of security of security management management SIEM technology provides real‐time event management and historical analysis of security data from a wide set of heterogeneous sources. This technology is used to filter incident information into data that can be acted on for the purposes of incident response and forensic analysis. Mark Nicolette, Gartner Benefits Turns raw log data into actionable information Increases visibility into security, compliance and operational issues Saves time through compliance reporting Streamlines the security incident handling process Lowers operational costs Why enVision? Any Data ‐ Any Scale • Collection of any type of log data, real‐time correlation, and best‐in‐ breed scalability Lowest TCO SIEM solution • Appliance form factor, agentless architecture • Flexible but simple customization Most Complete Security Knowledge • Comprehensive combination of event sources, correlation rules and reports • Frequent updates to security knowledgebase • Broad partner eco‐system of strategic technology partners plus front‐ line security and compliance expertise Proven Solution with a large and active install base • Unparalleled installed base of more than 1600 production customers • Active online customer “Intelligence Community” for shared best practices and knowledge All from EMC/RSA • Simplified IT operations, single point of contact, and global customer support • Integration with RSA and EMC solutions (e.g. Access Manager, Authentication Manager, Voyence, Celerra, Symmetrix) RSA enVision Stand‐alone Appliances to Distributed Solutions 300,000 30000 LS Series EPS 10000 7500 ES Series 5000 2500 1000 # DEVICES 500 100 200 400 750 1250 1500 2048 30,000 RSA enVision Deployment Scales from a single appliance…. Baseline Correlated Alerts Report Realtime Analysis Interactive Integrated Incident Forensics Query Mgmt. Event Explorer Analyze Manage Collect Collect Collect UDS Windows Server Netscreen Firewall Cisco IPS Juniper IDP RSA enVision Supported Devices Microsoft ISS Trend Micro Antivirus Device Device Legacy RSA enVision Deployment …to a distributed, enterprise‐wide architecture D‐SRV A‐SRV LC D‐SRV NAS NAS LC London European Headquarters Chicago WW Security Operations A‐SRV D‐SRV D‐SRV Mumbai Remote Office NAS LC A‐SRV: D‐SRV: LC: RC: LC Analysis Server Data Server Local Collector Remote Collector New York WW Compliance Operations Technical demo… Thank You! Any questions? [email protected]
© Copyright 2026 Paperzz