• Press Release

    August 17, 2011

    RSA Combines Blacklist Data Feeds and Threat Monitoring in RSA CyberCrime Intelligence Service

    Managed Service Designed to Help Enterprises Proactively Block Malware Threats and Diminish Threat Opportunity Window for Data Loss or Compromise

    BEDFORD, MA - August 17, 2011 -

    News Summary:

    • RSA announces significant new features available in the RSASM CyberCrime Intelligence Service
    • RSA CyberCrime Intelligence is a managed service engineered to provide information about external threats and data compromise to help enterprises monitor and harden their infrastructure against malware infection and data loss
    • New daily "blacklist" reports on live malware domains can help organizations proactively block malicious traffic from Trojans and phishing sites
    • Professional services consulting to help organizations improve security policies and controls

    RSA, The Security Division of EMC (NYSE: EMC) announced significant updates to its RSASM CyberCrime Intelligence Service designed to help enterprises monitor and harden their infrastructure against malware infection and data loss. Offered to complement RSA's broad portfolio of security and threat management solutions, the RSA CyberCrime Intelligence Service is a managed service that is designed to provide information on corporate end points, network resources, access credentials and other systems that may have been compromised by malware. Security professionals can use this information to help identify corporate end points and resources that may be at risk as a result of malware infection and remediate incidents of potential data exposure in the enterprise.

    In addition to gaining insight into malware-infected resources, the RSA CyberCrime Intelligence Service offers new daily reports on black-listed hosts and IP addresses used by cybercriminals for launching attacks and communicating updates to malware-infected computers that may be part of a botnet. When automatically fed into web filtering software, intrusion detection/prevention systems and other network monitoring and security solutions, this threat intelligence feed can be used to help sever the communication channels of existing malware, eliminating its ability to siphon information from companies and gain new instructions from command and control points.

    "IT organizations have traditionally focused on layered security which protects the perimeter. Now is the time to provide the same layered security model internally as well. That model, based on Governance, Risk and Compliance, must assume that malware has penetrated the enterprise and mitigate any damage which might occur", said Phil Blank, Managing Director, Security, Risk and Fraud at Javelin Strategy & Research. "By employing actionable information contained in threat intelligence reports and supplemented by active blacklist feeds to help prevent communications with command and control servers and data leakage, an enterprise can significantly improve their security posture and reduce their risks."

    Advanced forms of malware such as the Zeus and SpyEye Trojans can silently capture and exfiltrate a wide variety of data and credentials contained on enterprise endpoints, including proprietary information such as legal documents, healthcare records and corporate secrets. However, many organizations are unaware of the impact of malware within their systems that pose a significant threat to their information and bottom line.

    "Corporate internet users increasingly represent the largest source of infection in the enterprise by data-stealing malware via spear-phishing emails and social engineering attacks," said Sam Curry, Chief Technology Officer for RSA's Identity and Data Protection group. "The RSA CyberCrime Intelligence Service helps IT professionals further understand and isolate possible points of exposure within their enterprise so they can adjust security controls and close gaps to better protect their organizations against malware and data loss."

    The RSA CyberCrime Intelligence Service is designed to offer companies insight into potential compromises through a variety of regular reports and automated data feeds that provide lists of recovered data related to an organization's:

    • Systems, applications and resources derived from monitoring corporate URLs
    • Communication done over corporate email domains
    • Resources based on IP addresses of infected machines

    The information offered through the RSA CyberCrime Intelligence Service is gleaned from the RSA Trojan Research Labs and a network of anti-virus, firewall, anti-spam and Web crawling partners. RSA aggregates and analyzes this information to provide customers with continuous updates and broad visibility on the latest malware and malicious hosts found on the internet.

    Customers can also opt to receive an additional level of security consulting expertise integrated with their RSA CyberCrime Intelligence Service offering, to help identify and implement actionable plans to reduce cybercrime risk through:

    • Exposure analysis in social media and general web presence
    • Business process mapping, risk modeling and vulnerability and exposure analysis
    • Understanding industry and geographic trends
    • Ongoing monthly consulting for defensive and intelligence needs

    About Dell

    Dell EMC, a part of Dell Technologies, enables organizations to modernize, automate and transform their data center using industry-leading converged infrastructure, servers, storage and data protection technologies. This provides a trusted foundation for businesses to transform IT, through the creation of a hybrid cloud, and transform their business through the creation of cloud-native applications and big data solutions. Dell EMC services customers across 180 countries – including 98 percent of the Fortune 500 – with the industry’s most comprehensive and innovative portfolio from edge to core to cloud.

    Copyright © 2017 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.