INGATE

From The Sip Trunking Experts

TMCNet:  RSA Launches RSA NextGen Security Operations Services to Help Customers Build Battle-Ready Cyber Defenses

[February 26, 2013]

RSA Launches RSA NextGen Security Operations Services to Help Customers Build Battle-Ready Cyber Defenses

(ENP Newswire Via Acquire Media NewsEdge) ENP Newswire - 26 February 2013 Release date- 25022013 - RSA CONFERENCE 2013 - SAN FRANCISCO, CA -RSA, The Security Division of EMC (NYSE: EMC), today announced the release of RSA NextGen Security Operations Center (SOC) services designed to help organizations establish the core foundations for security operations while integrating newly released security analytics, threat intelligence, incident response and asset criticality capabilities.


This transformation of the SOC can help organizations respond faster and more efficiently to attacks, reduce breach exposure times and develop more predictive defense capabilities.

The RSA NextGen SOC services offer customers access to a deep bench of highly trained security practitioners with real-world experience in cyber defense who are capable of fulfilling SOC requirements specifically tailored to each organization's unique needs. These services are designed to establish the organizational foundation required to prepare for, discover and respond to threats in an agile, methodical and repeatable approach that reduces risk and business impact of incidents.

The RSA NextGen SOC services are designed to deliver customers a repeatable and sustainable service delivery framework that can enable organizations to transform current state reactive security programs into a predictive, intelligence-driven Advanced SOC. The services are engineered to ultimately deliver a program for organizations to leverage actionable data that can be presented in a unified method to aid security analysts and operators to make real-time decisions on incidents to help minimize impact to their organization.

As IT infrastructures and threats have evolved, driven by cloud, mobility and the hyper-connectivity of data centers, organizations are left struggling with tools, processes and skills designed to defend a non-existent perimeter. To be fully prepared for the advanced nature and proliferation of future threats, organizations are starting to take action now to revamp their SOC and incorporate newly released advanced security analytics, intelligence and risk assessment tools on top of traditional security controls for defense in depth.

RSA's approach helps facilitate actionable intelligence for security teams by focusing on key technical and operational areas including: Aggregation and analysis of threat intelligence data Correlation of content intelligence data throughout the organization Deployment of solutions that provide advanced analytic intelligence capabilities Development of security operations processes and procedures and the automation of related workflows RSA Executive Quote: Peter Tran, Senior Director, RSA Advanced Cyber Defense Practice 'In today's evolving threat landscape, it is critical that you unify three key perspectives to give you a battle ready SOC that is based on real-world needs and not academic policies. Our new service offering is designed to be delivered by expert practitioners with an average of 10 years of experience who understand how to integrate existing controls with the latest cutting edge solutions, streamline key security processes and incorporate valuable threat research to design a SOC for tomorrow's attacks, not yesterday's.' Analyst Quote: Christina Richmond, Program Director, Security Services, IDC 'We're seeing a prevailing shift among organizations around the allocation of resources and attention away from traditional, perimeter-based and reactive security methods and technologies to newer intelligence-driven analytic approaches that are more effective in helping mitigate advanced threats. By moving to these new approaches, organizations must update and enhance the skills of security analysts, the tools they use to gain a new level of threat visibility and also the processes and methods employed to prioritize and respond to incidents.' On March 14, 2013, RSA will host a webcast to provide additional detail and answer questions about the features and benefits of the RSA NextGen Security Operations services. To register, please visit www.EMC.com/RSA.

Additional Resources: Get more information on RSA Advanced Cyber Defense Services RSA Podcast: 'Building a Next Generation SOC - Using Intelligence to Find the Threats' EMC Pulse Blog: 'Preparing for the Inevitable - New RSA Service Helps Customers Defend Against Advanced Threats' White Paper: 'EMC Critical Incident Response Center' Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast.

About RSA RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments.

Combining business-critical controls in identity assurance, encryption & key management, SIEM, Security Analytics, Data Loss Prevention and Fraud Protection with industry-leading GRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.EMC.com/RSA.

About EMC EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset - information - in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at www.EMC.com.

EMC and RSA are either registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other products and/or services referenced are trademarks of their respective companies.

This release contains 'forward-looking statements' as defined under the Federal Securities Laws. Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.'s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centers or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in the filings of EMC Corporation, the parent company of RSA, with the U.S. Securities and Exchange Commission. EMC and RSA disclaim any obligation to update any such forward-looking statements after the date of this release.

Press Contacts Kevin Kempskie RSA, The Security Division of EMC 617-413-4333 kevin.kempskie@rsa.com [Editorial queries for this story should be sent to newswire@enpublishing.co.uk] ((Comments on this story may be sent to info@enpublishing.co.uk)) (c) 2013 Electronic News Publishing -

[ Back To SIP Trunking Home's Homepage ]

Loading
Subscribe here for your FREE
SIP TRUNKING enewslettter.

Featured Partner


Featured Whitepapers

SIP Security for the Enterprise
Voice over IP (VoIP) is incorporated into a variety of computer networks, both public and private, and used for everyday transactions and communications among carriers, businesses, government agencies...

Making A Broadband Purchase Decision
Businesses today have many options for broadband connectivity. Clarifying your particular business needs prior to selecting a broadband provider will ensure an optimal match of broadband service to your requirements.

Voice-Optimized Network Delivers Premier Call Experience
Customers equate call quality with business quality. Real-time communication, interpersonal interaction, and the cordial tone of a call center representative can create a positive impression of your business that no email can match.

Featured Case Studies

Business Telecom Expenses Reduced 50%
A small to medium sized company in the midwest was interested in migrating to IP Communications, but in today's economy, they were hesitant to upgrade their communication system due to their perception that the cost would outweigh the benefits.

Multi-State Company Cuts Telecom Costs 50%
A multi-site, multi-state company with extensive monthly long distance fees and toll-free charges did not have adequate broadband for Broadvox SIP Trunking requirements, nor did they have a SIP enabled telephone system.

Discover Leisure Connects Remote Users to its IP-PBX
Discover Leisure is one of the largest resellers of caravans and motor homes in the UK. With 15 branch of?ces all over the country, the company spent a great deal of money every month just on internal phone calls.

Featured eBOOKS

Internet+: The Way Toward Global Unified Communication
Connecting the telephony of the enterprise PBX or Unified Communications (UC) system using SIP trunks instead of conventional telephone lines has been very successful in recent years.

What is SIP Trunking? Edition 2
SIP trunking is becoming more of a focus for service providers. One key issue many service providers face when deploying SIP trunks is NAT, or Network Address Translation, traversal.

What is SIP Trunking? Edition 1
A vast resource for information about all things SIP - including SIP, security, VoIP, SIP trunking and Unified Communications.

Featured Videos

Broadvox VAR Testimonial VAR 1:
Part 1 of the VAR (Value Added Reseller) Partner Program Testimonials for Broadvox...

E-SBCs AS The Demarcation Point:
Ingate's Steve Johnson talks to Erik Linask about the role session border controller plays as the demarcation point at...

Demystifying DPI
How can deep packet inspection protect your SIP traffic as well as your entire network?

Featured Resources

Partner Program Overview:
Over 4,000 VARs, Master Agents, Solution Providers, and Independent IT Professionals trust Broadvox. We offer customized services and solutions to fit seamlessly into any company's business model. And when you partner with Broadvox, every member of our team stands behind you and your customers 100%...

SIP Trunk UC Summit

What's New

Presenting the New Ingate/Intertex Website:
Internet+ is an extended Internet access allowing high quality SIP (Session Initiation Protocol) based real-time person-to-person communication, everywhere and for any application. It applies to both fixed and mobile networks ...

Featured Blogs

Featured Webinars

Secure SIP Trunking:
What You Need to Know

Successfully Deploying Enterprise SIP Trunking:
Tools and Techniques for Overcoming Common Roadblocks

Featured Podcasts

Getting the Most Out of Your SIP Trunks:
Ingate's Steve Johnson and TMC's Erik Linask discuss how best practices forgetting the most out of SIP Trunking services and common pitfalls to avoid.

Featured Datasheets

Ingate SIParator E-SBCs
Adopting SIP is a simple process with the Ingate SIParator, the secure enterprise session border controller (E-SBC). The SIParator makes secure SIP communications - including VoIP,SIP trunking and more - possible while working seamlessly with your existing network firewall.

Ingate Firewalls
Everyone is talking about enterprise usage of VoIP, instant messaging and other types of realtime communications including presence and conferencing.

SIP Trunk Solutions for Service Providers
The award-winning Ingate Firewall and Ingate SIParator deliver a high quality, reliable SIP trunk connection between the customer's IP-PBX and the service provider network, and solve interoperability issues to simplify deployments and support for remote diagnosis of reported issues.