RSA Security Operations Management H12427 Ds

User Manual: RSA

Open the PDF directly: View PDF PDF.
Page Count: 2

DownloadRSA Security Operations Management H12427-ds-rsa-security-operations-management
Open PDF In BrowserView PDF
RSA SECURITY OPERATIONS MANAGEMENT
Orchestrate Intelligence, Process, and Resources in the SOC
CHALLENGES
Advanced Persistent Threats (APTs) are the one constant and enterprises are
centralizing incident-response teams to detect and respond to them. The Security
Operations Center (SOC) is the centralized incident-response team reporting through
the CSO/CISO and consisting of people, process, and technology.
As customers design and deploy a SOC, there are challenges. Today, SOCs are eventfocused and reactive because there is no centralization of alerts and incident
management. Additionally, the incident-response team lacks business context,
process, and people collaboration.

AT-A-GLANCE
 Centralize incident
management for security
incidents
 Effective incident response for
security incidents
 Optimize SOC investments
 Monitor and measure SOC
KPIs
 Manage the overall SOC
program including shift
management, team
capabilities, and security
control effectiveness

As customers implement SOCs, a framework is required to seamlessly orchestrate the
multiple roles, processes, and technologies. This framework should transform the
overall SOC to be a consistent and predictable business process.

SOLUTION
RSA Security Operations Management (SecOps) enables enterprises to seamlessly
orchestrate people, process, and technology to effectively detect and respond to
security incidents. Architected and designed by benchmarking world-class Security
Operations Centers, the solution is SOC process and persona focused. SecOps enables
organizations to manage the overall incident response, breach response, and SOC
program that is aligned to business risk.
From incident response to data-breach response, the SecOps solution enables
organizations to manage the entire lifecycle with integrated business context and best
practices aligned with industry standards. The incident analyst, breach coordinator, and
SOC manager have full visibility into the entire process lifecycle with focused workflows,
dashboards, and reports.
SOC Managers and the CISO can report on the overall effectiveness of the SOC
program because they have full visibility into incidents and data breaches.
Additionally, with intuitive dashboards, reports, and workflows, key stakeholders can
be engaged throughout the incident-management process.
The overall process from alert to incident investigation is automated, including
workflows and integration with security-monitoring systems for alert aggregation. From
a remediation perspective, any security incident requiring action from IT operations
could be automated by integrating SecOps with ticket-management systems.
Using SecOps, an enterprise can manage the overall SOC program as a consistent and
predictable business process.

Data Sheet

Key benefits of SecOps are as follows:
•

An out-of-the-box solution for incident management and prioritization
with workflows to guide the incident-response process.

•

Centralized incident management with business context by aggregating
alerts from multiple security-monitoring systems.

•

Data-breach response to meet regional regulatory requirements by
engaging key stakeholders and providing visibility to senior executives.

•

Optimization of SOC investments by monitoring KPIs and measuring the
effectiveness of security controls.

•

Measurement and reporting on the SOC program through monitoring and
dashboard KPIs that generate persona-based reports

KEY FUNCTIONALITY
– Incident Response
RSA SecOps collects security alerts from various security controls using standard
protocols. SecOps provides a workflow-driven incident-response process with
context, which is critical for an effective security-incident-management process.
SecOps collects the context from different sources and makes it available to an
analyst during the investigation of an incident. Additionally, RSA SecOps uses incidentmanagement best practices aligned with industry standards.

– Breach Response
The RSA SecOps solution helps organizations manage breach-remediation tasks and
procedures by engaging key stakeholders and providing visibility to senior
executives.

– SOC Program Management
RSA SecOps enables the SOC manager to effectively monitor SOC KPIs, measure
control efficacy, and manage the overall SOC team.

– Business Risk Management
RSA SecOps integrates OOTB with enterprise-risk-management solutions to assess
the risk and business impact of security incidents and data breaches.

EMC2, EMC, RSA, RSA Logo, RSA Archer and RSA Archer logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks
used herein are the property of their respective owners. ©2013 EMC Corporation. All rights reserved. Published in the USA. 10/13 H12427

www.rs .com



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Fill forms, Extract, Assemble, Print high-res
Tagged PDF                      : Yes
XMP Toolkit                     : Adobe XMP Core 5.2-c001 63.139439, 2010/09/27-13:37:26
Modify Date                     : 2013:12:30 07:45:46-05:00
Create Date                     : 2013:12:30 07:44:27-05:00
Metadata Date                   : 2013:12:30 07:45:46-05:00
Creator Tool                    : Acrobat PDFMaker 10.0 for Word
Document ID                     : uuid:38735a8c-d2fd-4f04-b30f-309d35c07124
Instance ID                     : uuid:806b6923-4209-410a-8b63-d1ca849a63c5
Subject                         : 2
Format                          : application/pdf
Title                           : RSA Security Operations Management
Description                     : Data Sheet
Creator                         : Bali Kuchipudi
Producer                        : Adobe PDF Library 10.0
Keywords                        : RSA, SOC, security operations center, advanced persistent threat, APT
Source Modified                 : D:20131230124405
Company                         : EMC Corporation
Created                         : D:20131024
Last Saved                      : D:20131104
Headline                        : Data Sheet
Page Layout                     : OneColumn
Page Count                      : 2
Author                          : Bali Kuchipudi
EXIF Metadata provided by EXIF.tools

Navigation menu