With RSA Conference 2017 kicking off this week, the security eco-system convenes to showcase and discuss the latest advances in the cybersecurity battle. The most compelling aspect is the collective focus on the future – how do we continually improve our ability to fight and protect against threats, but still allow the digital realm to expand.
A lot of focus is given to emerging micro-specialization – solutions that deal with one specific part of the puzzle. However, without the ability to tie best-of-breed solutions together to achieve an increased security posture and process efficiency, companies will be faced with integrating rather than moving initiatives and security performance forward. As always, we are focused on bridging gaps between the SOC and NOC, eliminating silos of information, and providing a “single pane of glass” for network security management.
Last week we talked about four trends we expect to see at RSA Conference. For the first time at the show, we will be demonstrating how these trends and customer input coalesced into major enhancements for our Network Sentry platform. Here are a few highlights if you don’t get the opportunity to see it in action:
Visibility: A fundamental building block to a secure network is endpoint visibility. In addition to the deep information we supply on who, what, where and when for each device (and the subsequent permissions granted), we’ve expanded the capabilities of Network Sentry to give greater control over virtual machines, and enhanced the topology view to give greater depth of centralized information for the entire network.
Integration: Building on the fundamental integration capabilities with technology partners, we’ve added integrations with both Tenable and Cyphort solutions and expanded the “self service” capability to enable customers to easily build additional integrations.
Automation: In addition to our automated network security triage and response automation, we’ve enhanced workflows for endpoint compliance configuration and permissions and provide a specialized dashboard, highlighting security events that need attention.
Analytics: In addition to historical and real-time capture of network security information to enable compliance and forensics, we also believe analytic information can enhance data-driven decision making. We’ve added the ability to capture business value related to events, tied to severity and effort required. This enables deep analytic capabilities to establish metrics such as ROI of solutions and resources.
We are always looking ahead to how we can solve the real-world issues our customers face today and poise them to effortlessly embrace the changes that are ahead including IoT, the latest technologies that will add critical functionality, investment protection, and scaling, while still maintaining cost efficiency, productivity, and centralized control. By designing solutions and open platforms that leverage customer feedback and requirements from day one of development, we’ve been able to offer stable, proven technology in an unstable world, and a solution with infinite opportunity to grow along with our customers.