• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • EMC Grabs Silver Tail to Fight Cyber Crime

    November 6, 2012 Alex Woodie

    The world of cyber fraud and cyber warfare is undergoing a period of rapid transformation and expansion, and with last week’s acquisition of Web fraud detection company Silver Tail Systems, EMC shows that it plans to be in the thick of the battles.

    Cyber criminals are increasingly using sophisticated technology and novel approaches–such as blended attacks and polymorphic malware–to gain an edge over the good guys and crack the security of the good guys. The problem is that traditional signature-based security tools are no longer sufficient to differentiate between regular Web sessions and malicious Web sessions. This is especially true when the overall volume of network traffic bumps the problem into “big data” realm, which tempts the bad guys to attempt to hide in the traffic.

    In response, the good guys are increasingly turning to tools that can analyze the behavior of Web sessions, as opposed to trying to detect certain types of files. Silver Tail Systems is one of the young companies incorporating behavior analysis into their security tools.

    Silver Tail develops “Web session intelligence” software designed to protect customers by evolving security threats by analyzing massive amounts of data collected in real time from the Web. The company says its behavioral analysis engine uses heuristics and rules “to detect anomalies, IT security threats, fraud, insider threats, business logic abuse and other malicious activity.”

    The Menlo Park, California, company has received accolades for its software, which it claims is providing monitoring for “upwards of 330,000 clicks per second for some of the largest ecommerce and banking providers on the market today.”

    Now that it’s part of EMC, Silver Tail products will be incorporated into the storage giant’s RSA subsidiary. Terms of the acquisition were not disclosed, as Silver Tail was privately held.

    “The industry is well beyond the point of providing effective security using static, perimeter point tools that fail to keep up with dynamic cyber attackers,” says Art Coviello, an executive chairman with RSA and an executive VP with EMC. “Customers need better intelligence, analytics, and the ability to respond in real time, which is a capability that Silver Tail’s products do extraordinarily well to help foil Web-based attacks.”

    RELATED STORIES

    LogRhythm Goes Multi-Dimensional in Security Analysis

    All Eyes on User Security as Cyber Criminals Up Their Game

    Security Bundle Blocks Unwanted Web Traffic from Reaching IBM i

    Progress Being Made In IT Security War, IBM Says

    Mobile Malware Set to Explode, Security Pros Say



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Abacus Solutions:  IBM i in the Cloud. We get it! Affordable and flexible hosting alternatives.
    Help/Systems:  Download the exclusive new white paper: The Performance Metrics Guide
    ITJ Bookstore:  Bookstore BLOWOUT!! Up to 50% off all titles! Everything must go! Shop NOW

    IT Jungle Store Top Book Picks

    Bookstore Blowout! Up to 50% off all titles!

    The iSeries Express Web Implementer's Guide: Save 50%, Sale Price $29.50
    The iSeries Pocket Database Guide: Save 50%, Sale Price $29.50
    Easy Steps to Internet Programming for the System i: Save 50%, Sale Price $24.97
    The iSeries Pocket WebFacing Primer: Save 50%, Sale Price $19.50
    Migrating to WebSphere Express for iSeries: Save 50%, Sale Price $24.50
    Getting Started with WebSphere Express for iSeries: Save 50%, Sale Price $24.50
    The All-Everything Operating System: Save 50%, Sale Price $17.50
    The Best Joomla! Tutorial Ever!: Save 50%, Sale Price $9.98

    Paging Doctor Watson Big Blue’s Power Systems Get Some Itanium Competition

    Leave a Reply Cancel reply

Volume 12, Number 31 -- November 6, 2012
THIS ISSUE SPONSORED BY:

Databorough
SEQUEL Software
HiT Software
CLOUDFAX400
Adsero Optima

Table of Contents

  • Premise Keeps Tabs on IBM i Cloud with Custom Dashboard
  • CA Opens 2E Arrays to Outside Web Services
  • Tableau Attracts Big Attention for Unique Approach to Data
  • RedPrairie to Buy JDA for $1.9 Billion
  • MSPs Expand IBM i DR and HA Practices
  • Infor Gives EAM an iPad Interface
  • Zend Debuts Studio 10 Beta
  • Halcyon Delivers Japanese Version of Management Tools
  • EMC Grabs Silver Tail to Fight Cyber Crime
  • AquaFold Power Tool Gets Hip to Big Data

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle