• Press Release

    October 29, 2013

    RSA Extends Big Data Analytics to Help Organizations Identify Highest Risk Vulnerabilities

    New Solution from RSA Helps Organizations Better Manage, Prioritize, and Mitigate High-Risk Threats

    Story Highlights

    • RSA today unveiled a new software solution, RSA® Vulnerability Risk Management (VRM)
    • RSA VRM takes a Big Data approach to help security teams identify and prioritize high-risk threats
    • As part of the RSA Archer® GRC platform, RSA VRM helps connect vulnerability risk programs with overall IT GRC work streams to enable better visibility into the overall security risk of the organization

    RSA CONFERENCE EUROPE 2013, Amsterdam - October 29, 2013 -

    RSA, The Security Division of EMC (NYSE:EMC), today unveiled RSA® Vulnerability Risk Management (VRM), a new software solution designed to help organizations improve their overall security posture by analyzing massive amounts of vulnerability scan data and helping to identify and prioritize the highest-risk vulnerabilities. RSA VRM is engineered to leverage Big Data and advanced analytics to identify the most important vulnerabilities so they can be fixed quickly to limit risk and better prevent cyber attacks.

    Read more about this news at EMC’s product and technology blog, EMC Pulse here.

    Combining asset business context, actionable threat intelligence, vulnerability assessment results and comprehensive workflows, RSA VRM helps proactively manage IT security risks and automates tasks to enable organizations to do more with fewer resources. The powerful data collection and aggregations capabilities are designed to allow RSA VRM to gather data from standard repositories as well as vulnerability scanning vendors to help more efficiently and effectively address potential threats. Additional benefits include:

    • Comprehensive catalogs for both technical and business data for each IT asset
    • Automation of manual tasks including workflow management, vulnerability lifecycle management and reports generation
    • Detailed reports on KPIs, ROI of programs, and overall IT security risk posture of an organization

    As part of the RSA Archer GRC platform, RSA VRM helps connect vulnerability risk programs with overall IT GRC work streams to enable better visibility into the overall security risk of the organization and is a critical component to an organization’s overall Critical Incident Response strategy.

    Availability:

    RSA Vulnerability Risk Management is generally available now.

    Analyst Quote:

    Chris Christiansen, Program Vice President, Security Products and Services, IDC

    "Vulnerability management tends to be a challenge many organizations have a hard time overcoming. Scanning the infrastructure for vulnerabilities provides a lot of information with very little context and understanding. By taking what is essentially a Big Data problem and turning it into the solution, security teams will be better armed to address their most pressing vulnerabilities".

    Executive Quote:

    James Ducharme, Senior Director of Engineering, RSA

    "Organizations have tens of thousands of IT resources that are critical for the survival and growth of their business, but many of them have vulnerabilities that can lead to exploits and attacks. With limited visibility into the highest-risk vulnerabilities, security teams are faced with the impossible feat of trying to patch everything at once. Using a Big Data approach and combining vulnerability scan results, business context of assets and threat intelligence, RSA VRM is designed to provide vital information around which vulnerabilities need to be addresses and the priority of order – helping security teams make the most of current resources and mitigate cyber attacks."

    Additional Resources:

    About RSA

    RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world’s leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.

    Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.EMC.com/RSA.

    RSA, EMC and Archer are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other products and/or services referenced are trademarks of their respective companies.

    About Dell

    Dell EMC, a part of Dell Technologies, enables organizations to modernize, automate and transform their data center using industry-leading converged infrastructure, servers, storage and data protection technologies. This provides a trusted foundation for businesses to transform IT, through the creation of a hybrid cloud, and transform their business through the creation of cloud-native applications and big data solutions. Dell EMC services customers across 180 countries – including 98 percent of the Fortune 500 – with the industry’s most comprehensive and innovative portfolio from edge to core to cloud.

    Copyright © 2017 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.