RSA: Solera networks partners with EMC

 

The companies’ technologies will create a network forensics storage solution aimed at Fortune 1000 companies and government institutions.
 
Operation Aurora that targetted Google and other prominent organisations, and recent ZeuS botnet variants, are examples of threats that will remain undetectable by current signature-based security tools.
 
The Solera DS SAN solution, powered by EMC, breaks the single-system storage barrier by providing incident responders instant access to the full detail of historical network activity in up to one petabyte of captured network data.
 
“EMC is the industry leader for enterprise storage solutions”, Steve Shillingford, CEO of Solera Networks told Infosecurity. “Customers are asking for even larger windows of captured network traffic and the ability to sift through terabytes of data for specific details of any security event. EMC are the gold standard.”
 
Shillingford described Solera networks’ business model as “a back-up when other security fails. It’s road-mapped from the concept of physical surveillance”, he explained.
 
Unlike log management, which Shillingford believes “misses stuff that they haven’t been told to look for”, the Solera networks technology “captures everything”. The technology not only enables an organisation to prove what has happened, “but is also useful for disproving what did not happen”, he said, referring to data breach incidents.
 
“Now that threats are more targetted, there is no security for that. So you have to know how to handle the situation when attacks get through. That’s what digital CCTV is for”, he said.
 
Solera networks technology allows you to monitor and analyse what somebody is doing in real-time. “That’s why we call it active networks forensics”, he explains.
 
Digital forensics technology is well positioned in a recession, said Shillingford. “In fact, people shift their budget to this type of solution in an economic downturn. People need a tool that will handle things a bit differently, and digital forensics fills a gap”, Shillingford concluded.
 

 

What’s hot on Infosecurity Magazine?