https://store-images.s-microsoft.com/image/apps.3289.44a1ec70-28f9-4317-8de7-45f9dde740f7.d7b250a3-ca29-4a44-859b-94f2177e1c11.5e4080f9-5015-4f74-852c-52e313dcb787
NetWitness Platform XDR 12.0.0.0
RSA Security, LLC
NetWitness Platform XDR 12.0.0.0
RSA Security, LLC
NetWitness Platform XDR 12.0.0.0
RSA Security, LLC
NetWitness Platform XDR 12.0.0.0 on Azure
NetWitness Platform XDR
RSA Security, LLC
NetWitness Platform XDR for Azure Increases Visibility, Improves Response Efficiency
See Everything. Fear Nothing. By rapidly detecting and responding to today’s targeted attacks
NetWitness is an Evolved SIEM and Open XDR platform that accelerates threat detection and response. It can collect and analyze data across all capture points (Logs, Packets, NetFlow, Endpoint, and IoT) and computing platforms (physical, virtual and cloud), enriching data with threat intelligence and business context.
The NetWitness Platform XDR allows security analysts to prioritize, respond, reconstruct, survey, investigate and confirm information about the threats in their environment and take the appropriate response—quickly and precisely.
Key Features:
Unparalleled visibility
Gives security teams the visibility they need to detect sophisticated threats hiding in today’s complex, hybrid IT infrastructures. Provides real-time visibility into all network traffic with full packet capture, deep packet inspection, along with on-board decryption, allowing you to detect emerging, targeted, and unknown threats as they traverse the network, monitor attackers’ movement, and reconstruct entire network sessions.Improved analyst productivity
Orchestration and automation capabilities make it easier for analysts to prioritize and investigate threats faster and coordinate activities across the entire security team. Empowers analysts to hunt the most advanced threats.Faster, more advanced threat detection
Detects attacks in a fraction of the time of other platforms and connects incidents to expose the full attack scope. Speeds threat detection and investigation by enriching network and endpoint data at capture time with threat intelligence and business context.Smarter, faster analytics
Analytics powered by machine learning with the scale of cloud delivers early detection of anomalies that lead to external and internal threats.
Detection
Policy Based Centralized Content Management
A unified approach to find, deploy, and manage content through the entire lifecycle based on policies that can be assigned to groups of devices
Content Bundles
A logical grouping of content that allows customers to deploy based on detection use cases without knowledge of all the underlying content types
Detections using Yara Rules
Endpoint agents run Yara rules locally to find malicious files
Endpoint Detections using Imported File Hashes
Analysts can import a list of file hashes that will automatically be blocked if seen in the environment
Arm Processor Support
Administrators can install endpoint agents on Arm based systems, including Microsoft Surface hosts
TLS 1.3 Decryption
Expands the network packet decryption capability to provide customers with the ability to inspect TLS 1.3 encrypted communications using ephemeral session keys
Improved Log Parsing
Improvements to handle parsing of structured and unstructured data embedded in variables of logs and handling multiple duplicate meta
Response
Reimagined Response to Endpoint Alerts
As analysts triage alerts all the relevant information is made available including a process tree
Key Performance Indicators
Reports to provide SOC managers operational metrics, including MTTA, MTTD and MTTR
Rich OOTB Springboard Panels
Analysts gain insight to suspicious behaviors and can customize the Springboard
Convert Query into Springboard Panel
During investigations an analyst can convert a query into a Springboard panel to keep a watch on the results
Bulk MFT Download
Analysts reviewing an incident related to multiple endpoint agents save time by doing bulk downloads of all the master file tables
Respond Flexible Deployment
Increased visibility into detections with Respond and context enrichment are more accessible as both components can be deployed in the absence of the Event Stream Analytics
Deploy
Endpoint Agent IP Filtering by CIDR Notation
Administrators can group endpoint agents using CIDR notation in addition to individual IP addresses
Guidance to Automate Full Stack Cloud & VM Deployments
Customers with virtual or cloud environments can use documented steps to automate their existing infrastructure and manage upgrades