22.01.2016 Views

The GSN 2015 Digital Yearbook of Awards

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

analysts automatically at the suspicious modules and<br />

attack vectors identified such as: floating code, hidden/<br />

temp/program data folder write to executable, scripts<br />

run (PSexec, whoami, etc.) which equips the analyst<br />

with tools and techniques used to not only identify the<br />

how but the who as well. All IIOCs are executed serverside<br />

as data is processed, reducing no overhead on the<br />

agent and client performance.<br />

• Detection and Visibility through Layered Approach.<br />

While ECAT performs live memory analysis and in-depth<br />

inspection <strong>of</strong> host behavior, it is also leveraging other<br />

ways <strong>of</strong> enriching data for analysis by using OPSWAT,<br />

Yara, module reputation models, and multiple threat<br />

intelligence data feeds including RSA Research and<br />

community-based intel via STIX, enabling analysts to<br />

quickly come to a resolution and take response action.<br />

• Detect, Investigate and Response. While threats will<br />

find their way into the organization, being able to trigger<br />

a response action to shorten dwell time is a key.<br />

ECAT is able to block and quarantine suspicious modules<br />

for endpoints within a corporate network as well as<br />

endpoints <strong>of</strong>f network connected to the Internet.<br />

• Machine Learning Risk Score system. <strong>The</strong> Risk Score<br />

system collects and analyzes vast amounts <strong>of</strong> data on<br />

the endpoint and network data transferred in/out and<br />

compiles a module and machine risk score based on a<br />

statistical machine-learning, adaptive model. ECAT’s analysts<br />

leverage the risk score as the basis for prioritized<br />

investigation, working on the most risky endpoints such<br />

as: module behavior, machine status, threat intelligence,<br />

business context, etc. Significant contributors to ECATs<br />

Risk Scoring system are RSA’s data-science team and Incident<br />

Responders providing contact feedback and new<br />

findings identified.<br />

• Enterprise Scalability. ECAT protects 50,000 agents<br />

with a single ECAT server.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA ECAT Home Page:<br />

https://www.emc.com/security/rsa-ecat.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Bryan Grillo, Vice President<br />

CHEN PR<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (781) 466-8282<br />

cell: (617) 947-0547<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

bgrillo@chenpr.com<br />

73

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!