Security Experts:

Connect with us

Hi, what are you looking for?


Network Security

RSA Enhances ECAT Endpoint Protection Solution

RSA today unveiled the latest version of ECAT, an endpoint protection solution designed to detect and block advanced threats based on their behavior.

RSA today unveiled the latest version of ECAT, an endpoint protection solution designed to detect and block advanced threats based on their behavior.

Traditional signature-based endpoint defense products are no match for today’s advanced threats, which is why security solutions providers are working on developing new technologies capable of detecting even the most stealthy threats.

RSA ECAT is designed to detect malware by looking at the behavior of processes in search for suspicious indicators. The latest version of the product enables real-time visibility, detection, and response even on endpoints that are outside the corporate network.

By comparing changes in memory to changes on the disk, the solution can detect code injection, hooking and other techniques used by malicious actors. Once a threat is detected, RSA ECAT can automatically block or quarantine it.

ECAT enhancements also include a new intelligent risk scoring algorithm that helps analysts prioritize their response to security alerts.

Since large enterprises are constantly under attack, it can be difficult for security teams to tell which alerts require urgent attention. The new system in ECAT allows analysts to determine which incidents are the most threatening so they can focus on them before damage is caused.

Security operations center (SOC) teams can combine the new ECAT capabilities with RSA’s Security Analytics solution for enhanced visibility across the enterprise — from endpoints to the cloud.

RSA also announced today the newest version of RSA Via Lifecycle and Governance, an identity management solution designed to help enterprises ensure that their users have the right access to the right resources without having to sacrifice agility, security or compliance.

New capabilities in RSA Via Lifecycle and Governance enable organizations to quickly detect unauthorized activities such as malicious privilege escalation. The solution is also able to determine when an end user bypasses IT processes to gain “out of band” access.

RSA Via Lifecycle and Governance is part of the Via portfolio of smart identity solutions, which the company introduced at the RSA Conference earlier this year.

The next version of RSA ECAT and the new RSA Via Lifecycle and Governance release will become available in the third quarter of 2015, RSA said.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Network Security

Cisco patched a high-severity SQL injection vulnerability in Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition (CM SME).

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Vulnerabilities identified in TP-Link and NetComm router models could be exploited to achieve remote code execution (RCE).