HP introduces update to ArcSight Threat Detector 2.0 and Threat Response Manager 5.5

TRM.png

 

HP today announced updates to its Big Data Security Analytics through HP ArcSight portfolio to enhance early detection and accelerate threat response and prevention.

 

According to a recent report on advanced targeted attacks released by Mandiant, attackers spend an estimated 243 days on a victim’s network before they are discovered.  In addition, nearly two-thirds of organizations learn that they have been breached from an external source, such as a customer or law enforcement.

 

Heuristic analysis and threat detection:

 

HP ArcSight ThreatDetector uses heuristic analysis to identify benign and malicious repeating event patterns and creates rules for future real-time detection of zero day, and low and slow attacks.

 

With the latest 2.0 release, HP has added out-of-the-box pattern analysis profiles which focuses the heuristic analysis on common areas of analysis such as browsing patterns, distributed attack detection, early stage attack detection and AV activity profiling. This makes. This helps our customers to start with most threat profiles by default, and built intelligent profiles automatically with time.

 

Respond quickly to reduce risk of data loss

 

After the threat has been detected, clients need to isolate the intrusion and resolve the compromise before valuable data is exfiltrated from the network. The new HP ArcSight Threat Response Manager (TRM) 5.5 provides an integrated, end-to-end network security and monitoring solution that enables businesses to respond to threats proactively, shutting out intrusions before the can cause more damage.

 

To help mitigate an even great number of threats, HP has extended TRM’s capabilities beyond the data center and into the cloud. TRM is being offered as a virtualized appliance on VMWare, giving clients greater deployment flexibility while helping address their unique security needs.

 

“HP ArcSight allowed us to go from a reactive to a much more proactive approach to information security. Without HP ArcSight, there is no way that we could aggregate these types of events and get the visibility that we have.” said Keith Duemling, Information Security Officer, Lake Health

 

Randy Franklin Smith, who leads the Windows security blog, wrote in his whitepaper on ‘TOP 5 TRUTHS ABOUT BIG DATA HYPE AND SECURITY INTELLIGENCE’ that “HP’s data scientists package the most advanced analytics, as well as threat and anomaly detection, directly into an easy-to-use intuitive interface.”

 

Get started with free trial of HP ArcSight log management solution to understand the power of logs and ArcSight here: www.hp.com/go/hplogger

 

HP_Protect_Register_Now_600x60_Static.jpg

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation