ICT World & Computing SA proofing sponsored by Lexmark.
 
CA introduces eTrust Security Command Center r8
 
Date: 12 November 2004 Issue: One Hundred and fourteen (08/11/04 - 13/11/04)
(ICT World)
Category: Technical & Product News
 
Computer Associates Africa has introduced the latest version of its eTrust Security Command Center offering, r8 - a solution designed to manage and respond to security events across the enterprise, which, in turn, aims to reduce business risk, increase security visibility and awareness, and assist with regulatory compliance.
 

Key new features are said to include out-of-the-box correlation tools, Web-based update services, advanced incident management functions and customisable workspaces designed for specific tasks such as comparing an organisations security posture and vulnerabilities against the standards set by the SANS Institute.
 
Advanced bi-directional integration with network and systems management solutions, such as Computer Associates Unicenter NSM, also aim to enable IT security teams to leverage data from those solutions, so as to more effectively detect and respond to a full range of threats. 
 
According to the company, eTrust Security Command Center monitors and manages all aspects of enterprise security, from threat discovery through resolution, in real time.

It aims to provide a centralised command-and-control centre that presents security data in an intuitive graphical interface that enables IT security teams to quickly identify and respond to events and vulnerabilities, based on their urgency and potential business impact.
 
Comments Karel Rode (CISSP), security sales executive at Computer Associates Africa: In the event of a security breach, the investigation team looks at the system events and logs of the affected systems, however, often these logs are not archived properly. Moreover, these logs do not allow the team to continuously improve a companys security posture.
 
eTrust Security Command Center r8s Audit feature, for example, allows companies to collect events from wide range of industry standard operating systems, applications and appliances. And, once data is reduced according to a policy, as defined on the SCC machine, data correlation can commence. Also, data sets from various systems can be compared again according to a central policy ensuring that areas of commonality for an attack threat can be found, with appropriate actions from the responsible team members.
 
Rules-based correlation

eTrust Security Command Center r8 is designed to use rules-based correlation to zero in on root cause issues that underlie security events. Its out-of-the-box event correlation tools are said to include:
 
*Rules library with more than 100 default policies for fast threat analysis; *Automatic policy updates via the Web; and

*Rule templates and wizards that facilitate creation of customised rules.
 
Keeping up with CAs Enterprise Infrastructure Management strategy, eTrust Security Command Center aims to enable IT organisations to manage security in a common manner with other infrastructure, application and data management processes, such as those running under CAs Unicenter Network and Systems Management (Unicenter NSM).
 
This integrated approach reduces technology ownership costs and enables security policies to be extended across functional areas for example, in using data about network traffic anomalies to better identify the nature of a security event, CA adds.
 
Additionally, eTrust Security Command Center r8 aims to add value by providing companies with updates of correlation rule templates, workspaces and agents via the Web. These updates are tested and validated to ensure their effectiveness, CA concludes.

 

 
[ Print Now ]
[ Close Window ]