Skip to main content
Meet NetWitness at RSA Conference 2024!
Stop by our booth #254 or book a meeting with an expert. Reserve Your Spot Today!
BLOG

Products & Solutions

CVE-2024-24919 in NetWitness Network

A successful exploit of CVE-2024-4956 can have severe consequences for organizations relying on Check Point appliances for protection. Authors: Albert Priego Bravo, Massimiliano Faudarole.

Read more

The Sky Is Crying: The Wake of the 19 JUL 2024 CrowdStrike Content Update for Microsoft Windows and What We Should Remember and Take Away From It

Friday the 19th was a challenging day for many organizations, teams, and individuals worldwide. We can all agree that it was stressful, and the impacts are still being assessed. It will take some time for many organizations to fully understand the ramifications of what has been called the single largest IT outage in history. On a personal note, my own family was impacted, which brought the matter home for me and many others. The outage resulted from a content update pushed by CrowdStrike to its global customer base. The systems impacted by this content update were those running the Microsoft Windows operating system. The organization has clearly acknowledged that neither […]

Read more

Indicators of Compromise: A Comprehensive Guide to IOCs in Threat Detection and Response

The term “Indicators of Compromise” refers to artifacts or pieces of data that provide evidence that a security incident may have occurred or is ongoing. These indicators act as red flags, signaling potential security threats that require investigation and remediation. IOCs can manifest in various forms, and their identification is crucial for timely and effective threat response. The primary objectives of IOCs are to: Detect Security Incidents At the core of IOCs lies their function as early warning signs, functioning as a sentinel against potential security incidents. By identifying unusual patterns or behaviors within a digital environment, IOCs serve as proactive indicators that alert organizations to investigate potential threats. This […]

Read more

Data Warehouses vs Data Lakes: Navigating the Choice

In the realm of data management and analytics, organizations encounter a pivotal choice when selecting an appropriate data repository. Data warehouses vs data lakes emerge as distinct methodologies for managing and analyzing data. A comprehensive understanding of their variances and advantages becomes imperative for making a well-informed decision that harmonizes with your organization’s goals. In this article, we will explore the fundamental distinctions between data warehouses and data lakes in a NetWitness environment, aiding you in identifying the solution that best aligns with your specific needs. Netwitness further extends its expertise by providing tailored solutions to ensure optimal data management aligned with your organizational objectives. Understanding Data Warehouses Data warehouses […]

Read more

Cybersecurity Resilience: NetWitness EDR vs Open Source EDR Solutions

Cybersecurity is one of the most prominent issues facing organizations today. After all the hard work it took to build your company from the ground up, it can seem like there is always a fight to protect it. Cyber threats can damage your organization’s reputation and put client information at risk. For this reason, you invest in the best security technologies. However, in order to leverage your technologies for maximum security, you need to first understand what those benefits are.  If you’ve recently ventured into the world of endpoint detection and response, NetWitness is here to provide you with the ultimate guide. If you would like to understand what EDR […]

Read more

Managed SIEM Services: Cybersecurity with Expertise and Efficiency

If you are a business owner or decision-maker, then you know the importance of working with experienced professionals when it comes to certain tasks and responsibilities. When you need someone to make copies, answer phone calls, and go on coffee runs, you might be perfectly comfortable delegating these kinds of duties to an entry-level employee. But when it comes to entrusting someone with your organization’s cybersecurity, you want someone knowledgeable, experienced, and proactive. Cybercrimes are on the rise, and the sophistication of the means and methods that cybercriminals use to carry out their nefarious activities are able to closely rival the mechanisms used to deter them. According to Cybersecurity Ventures, […]

Read more

NetWitness 12.3: Delivering Greater Visibility for Modern Distributed Enterprises

Robust cybersecurity and comprehensive visibility are no longer optional in today’s world of hybrid work environments, growing cyber threats, and increasing cloud adoptions—they’re a must.  Here to meet this challenge is the NetWitness 12.3 release, loaded with an impressive array of cutting-edge features and integrations to provide maximum visibility for today’s Security Operations Centers (SOCs) and designed to meet the evolving demands of modern, distributed enterprises head-on.  NetWitness 12.3 delivers unrivaled network visibility for rapidly growing SASE deployments, patented cloud-native asset classification and ranking analytics, and efficiency improvements for administrators and security analysts. It also strengthens partnerships with key cybersecurity vendors, including Palo Alto Networks, Symantec by Broadcom, Splunk, ZScaler, […]

Read more

Leverage UEBA for Comprehensive Network Security with NetWitness

As cyber security threats continue to increase, along with the levels of sophistication they use to carry out their attacks, organizations are looking for ways to enhance their security capabilities within their existing infrastructure. Designing and implementing new security measures is an extremely difficult task that can take many months or years to effectively complete, and it is overwhelmingly complex to integrate these measures into other systems that an organization uses to carry out its basic functions. However, there is an existing capability that can address many of these concerns while also reducing the amount of time and overhead it takes to implement a more exhaustive approach to security needs. […]

Read more

Network Forensic Tools: The Key to Network Forensics

The world of business and technology is ever-evolving, and in this new digital age, network security and threat detection is more important than ever to any successful organization’s IT infrastructure. However, without a robust system of cyber security measures, businesses can easily become vulnerable to hackers, malware, viruses, and other attacks launched by malicious actors. As such, it’s vital for organizations like yours to take a proactive approach to protect their networks from these threats. Not only do these network security measures ensure the safety of sensitive data and prevent costly breaches, but they also allow businesses to focus on furthering their business goals while minimizing worry about the potential […]

Read more

Unlocking the Full Potential of SASE

Essential strategies for future-proofing your organization with SASE. The rise of remote work and distributed teams has driven a rethinking of traditional network solutions. The result is Secure Access Service Edge (SASE), a transformative technology delivering enhanced networking and security features, offering a unified approach to safeguarding businesses while enabling modern business models. By leveraging SASE, your business can build a flexible, scalable, and secure network infrastructure that evolves with its needs, making it a powerful tool for maintaining a competitive edge.  However, as with many IT evolutions, SASE has had an impact on cybersecurity that must be addressed to preserve previous levels of protection. This article provides essential strategies […]
Read more

NetWitness FirstWatch Maps Threat Intelligence Content to the MITRE ATT&CK Framework

The MITRE ATT&CK Framework is a comprehensive matrix of cyber adversary tactics and techniques designed to give defenders, threat hunters, and red teams a common understanding of the attacks they encounter every day. It helps identify, attribute, and even defend against threat actors. It has truly become the de facto model used by cybersecurity teams across the globe.
Read more

Moving the XDR Industry Forward with NetWitness Platform XDR 12

The promise of XDR is exactly this: simplify the spectrum of processes – administratively and operationally – to the point where a security-conscious organization, on its own or through a service provider, can effectively protect against cyberthreats and suppress the risks imposed by these attacks. Enter NetWitness Platform XDR 12.
Read more

XDR: A New Name and a Major Release

NetWitness will soon release NetWitness Platform XDR v12.0 for customer download! This post covers highlights of this upcoming release including the updated product name. For more information on features and functionality, follow the links at the bottom. New Branding – NetWitness XDR NetWitness has long been synonymous with world class visibility, enabling customers to hunt for, and respond to, threats observed in network traffic, log data, and on endpoint machines. This has been called many things, from Security Analytics to Evolved SIEM, but now it is commonly known as XDR, eXtended Detection and Response. Our statement to the world: NetWitness is XDR. We’ve been doing it for years. Fundamentally, XDR […]
Read more

NetWitness XDR Delivers the Industry’s Most Complete Solution – Today and Tomorrow

It seems as though the world of cybersecurity has transitioned overnight. XDR, or eXtended Detection and Response, has become the mantra of every major player. Here at RSA Conference 2022, everyone from the endpoint, network, SIEM, and IoT worlds has suddenly embraced XDR as their core strategies—however loosely aligned with what they’re actually offering in terms of products and services. Why is that? There are two primary reasons. 1. XDR has become the new shorthand for effective, efficient cyber protection. The cybersecurity industry has grown organically over the course of decades, springing up solution types as the threat landscape evolved. This has created a proliferation of companies with narrow specializations […]
Read more

A New Path Forward for our Channel Partners

Companies of all sizes, across all industries, around the world need effective threat detection and response capabilities. Try as we might, we at NetWitness know that when it comes to helping these organizations prepare for and battle against cyber threats, we need help. For years we’ve relied on our channel partners to help extend the reach of our cybersecurity solutions, and they’ve leveraged their industry expertise, geographic reach, and other relevant experience to work with all kinds of companies to improve their security postures. Today, we’re pleased to unveil a new channel program that better enables our partners – whether they are resellers, distributors, or MSSPs – to help protect […]
Read more

Understand Performance and Better Organize Threat Data with New NetWitness Orchestrator 6.3

In the battle against new and aggressive threats, one thing has become abundantly clear: the more efficient a security team is, the better the opportunity it has at minimizing the impact of threats—or avoiding them all together. And with this mission of visibility and efficiency, NetWitness introduces the release of NetWitness Orchestrator 6.3. NetWitness Orchestrator 6.3 delivers two critical features: New threat groupings that improve the categorization of threats within the threat library. Workflow Metrics that measure how effectively organizations are detecting and resolving issues, while also reporting on the ratio of false positives vs. actual indicators of compromise. Both of these key threat and response features can drive both […]
Read more
blog post

Build Your SOC’s Security Strategy with SOAR

NetWitness spoke with Tari Schreider of Aite-Novarica Group about SOAR technology and the benefits it can deliver to SecOps for accelerating threat detection and response. Tari talks about SOAR misconceptions, the user experience that SOAR solutions should deliver, and how SOAR can help enterprises be more efficient.
Read more
blog post

NetWitness Adds Powerful IoT Monitoring and Threat Detection

The Internet of Things is dramatically expanding the security surface area for organizations around the globe. What’s needed is a strategic solution that supports proprietary industrial systems as well as a new generation of open, standards-based solutions. NetWitness IoT brings IoT security into the future.
Read more

Introducing NetWitness Cloud SIEM: All the Power Without the IT

NetWitness is the security and compliance choice for of the world’s largest, most complex and most security-conscious organizations. NetWitness Cloud SIEM makes it easy for organizations of any size and type to deploy world-class SIEM for threat detection or compliance purposes.
Read more
RSA blog post

How Useful Are Your Threat Intelligence Feeds?

Threat Intelligence (TI) is a vital component of your security automation and response (SOAR) system. Security analysts need TI that’s current, in context, and that reflects the reliability of the feed source. NetWitness Orchestrator optimizes TI data so security analysts can process cases faster and remediate completely.
Read more
Visualization of smart SOAR

Orchestration and Automation without Intelligence is just Dumb

When it comes to SOAR solutions, threat intelligence needs to expand beyond threat detection. It should play a role in every aspect of incident identification, investigation and resolution. Without properly leveraging threat intelligence, SOAR solutions can miss the mark when it comes to improving security operation efficiency.
Read more
Visualization of RSA NetWitness Detect AI

Introducing RSA NetWitness® Detect AI

RSA NetWitness Detect AI is the all-new pure SaaS analytics module for RSA NetWitness Platform. It makes threat detection better, faster, and easier for advanced security operation centers.
Read more
Various icons appear to be soaring towards a bright ligth

Visibility into the Unknown

The concept of enabling a dynamic workforce has shifted from a “nice to have” to a mandate to help the organization remain productive. Many organizations ask how RSA, and more specifically RSA NetWitness Orchestrator, can help them overcome the new security risks associated with the dynamic workforce. Hear what one of our System Engineers has to say.
Read more