Multiple data sources + analytics = improved situational awareness Remember when commercial security incident and event management (SIEM) platforms came out in the early 2000s? At that time these systems were designed to take in firewall and IDS events, correlate and filter the data, and let you know whether you were under attack. Since then, SIEM platforms have gone in a multitude of directions like compliance, IT operations, and network performance management based on where the VCs saw the best chance for short-term revenue. Fast forward to the past few years — the era of low-and-slow sophisticated attacks sometimes referred to as Advanced Persistent Threats (APTs). CISOs quickly learned that their “jack-of-all-trades” SIEM platforms weren’t so helpful for things like log management, security analysis, or forensic investigations. To cover these requirements, large organizations turned to the likes of Fidelis Security, FireEye, LogRhythm, Splunk and Trend Micro. Earlier this week, RSA Security jumped into the fray, albeit with a different approach that may be especially interesting for enterprises with lots of Internet traffic and complex networks. Combining multiple assets, RSA announced a nomenclature mashup product called RSA NetWitness Panorama. Panorama can be a bit confusing as it can be part of a NetWitness implementation, deployed with enVision, or act as a stand-alone log management service. In the NetWitness context, Panorama is intended to enhance “situational awareness” by bringing together network forensic and log data into a common platform for analytics. If you think you are under attack you now have one place to go for analysis across multiple data sources. The bad guys know how to cover their trail and find places to hide. Combining network forensic and log data gives CISOs a more complete intelligence picture in order to smoke them out.In reading between the lines here, Panorama also points to a burgeoning security architecture from RSA. I foresee a data collection tier, a middleware tier, and then multiple analytics engines that use this data for various purposes (event detection, security controls management, analytics, compliance, etc.). I know IBM and HP are thinking along the same lines.Security is really about two things: 1) Make attacks as difficult as possible. This involves risk management, secure IT design, layered defenses, etc., and 2) Implement the right tools and analytics to detect and respond to attacks. Security best practices tend to focus on #1 but we need really strong data analytics to deal with #2. This is the area that RSA is focused on. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe