Solera DeepSee Security Software Goes Deep with Big Data
April 26, 2012
Security specialist Solera Networks is upgrading its DeepSee Software solution, which combines security intelligence and Big Data analytics technology to record and classify every packet, file and flow going in and out of the network for the reconstruction of an attack. Think of it as a security camera for your network.
The software is compatible with a variety of platforms, including Dell (NASDAQ: DELL), HP (NYSE: HPQ) and IBM (NYSE: IBM), and offers context-aware security, which detects advanced targeted attacks that bypass traditional preventative security control.
The offering is part of the company’s network security analytics focus, which integrates security information event management, log management, intrusion detection systems, data loss prevention, deep packet inspection and malware detection tools.
Since it’s able to record, store and index all the data that comes across a network when a threat occurs, an organization can search, replay, analyze and even reconstruct data flows as it happened, just like a security camera would. That makes the job of reconstructing the event — and preventing it from happening again — much easier.
Security is once again playing a major role in networking as the data center becomes the new center of the universe for many VARs looking for their way into the cloud. Couple that with new threats that can bypass or simply overwhelm old security monitoring tools, and it becomes obvious the next-generation of security intelligence platforms must be more than just scanning tools. Incorporating newer technologies such as Big Data analytics capabilities can mean the difference between finding a breach after the fact and proactively preventing new breaches from occurring.
In January 2012, Solera raised $20 million in Series D funding led by Intel Capital. According to the company, its revenue grew by more than 100 percent last year, fueled by mounting concerns among businesses of their vulnerability to Web-based security threats.
About the Author
You May Also Like