Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

RSA Enhances ECAT Endpoint Protection Solution

RSA today unveiled the latest version of ECAT, an endpoint protection solution designed to detect and block advanced threats based on their behavior.

RSA today unveiled the latest version of ECAT, an endpoint protection solution designed to detect and block advanced threats based on their behavior.

Traditional signature-based endpoint defense products are no match for today’s advanced threats, which is why security solutions providers are working on developing new technologies capable of detecting even the most stealthy threats.

RSA ECAT is designed to detect malware by looking at the behavior of processes in search for suspicious indicators. The latest version of the product enables real-time visibility, detection, and response even on endpoints that are outside the corporate network.

By comparing changes in memory to changes on the disk, the solution can detect code injection, hooking and other techniques used by malicious actors. Once a threat is detected, RSA ECAT can automatically block or quarantine it.

ECAT enhancements also include a new intelligent risk scoring algorithm that helps analysts prioritize their response to security alerts.

Since large enterprises are constantly under attack, it can be difficult for security teams to tell which alerts require urgent attention. The new system in ECAT allows analysts to determine which incidents are the most threatening so they can focus on them before damage is caused.

Security operations center (SOC) teams can combine the new ECAT capabilities with RSA’s Security Analytics solution for enhanced visibility across the enterprise — from endpoints to the cloud.

RSA also announced today the newest version of RSA Via Lifecycle and Governance, an identity management solution designed to help enterprises ensure that their users have the right access to the right resources without having to sacrifice agility, security or compliance.

Advertisement. Scroll to continue reading.

New capabilities in RSA Via Lifecycle and Governance enable organizations to quickly detect unauthorized activities such as malicious privilege escalation. The solution is also able to determine when an end user bypasses IT processes to gain “out of band” access.

RSA Via Lifecycle and Governance is part of the Via portfolio of smart identity solutions, which the company introduced at the RSA Conference earlier this year.

The next version of RSA ECAT and the new RSA Via Lifecycle and Governance release will become available in the third quarter of 2015, RSA said.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet