Product Watch: RSA Launches CyberCrime Intelligence Service For Businesses

RSA's Anti-Fraud Command Center says 88 percent of Fortune 500 firms have been touched by infected machines, and 60 percent had email account information stolen

Dark Reading logo in a gray background | Dark Reading

A new managed security service from RSA alerts businesses of signs of Zeus, Sinowal, and other banking Trojans infiltrating their systems. The new Cybercrime Intelligence Service, rolled out today, uses RSA's existing fraud detection and anti-Trojan services to monitor evidence of abuse aimed at specific organizations.

The service basically provides companies with information and analysis about their machines, identities, and other resources that are infected by malware used for cybercrime.

"We felt that enterprise security managers don't have much sense of the direct impact malware is posting to their organizations and whether their security policies and procedures are strong enough," says Sean Brady, senior manager for identity protection and verification at RSA.

The new service provides organizations with intelligence about these infections and evidence of stolen data or information. "We provide actionable intelligence for them," Brady says. When a company's IP address or domain are discovered in Trojan drop zones, for instance, the service -- which uses RSA's existing AntiFraud Command Center -- will alert the victim company.

"If information recorded by the Trojan by IP address or domain points to our customers...we can tell them [the Trojan] is 'hitting this machine sitting on your network,'" he says.

RSA's Anti-Fraud Command Center found that among the Fortune 500, 88 percent had systems that were accessed by infected machines, and 60 percent had email account information stolen. RSA's Brady says the data shows how exposed the Fortune 500 is to malware overall.

The CyberCrime Intelligence Service costs about $7,500 per month, and will be available on May 1. "What's unique about what RSA is offering is that we have the ability both to identify the machines affected by these infections, and can then provide that information back to our customers about the impact of this on their organizations," Brady says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Read more about:

2010

About the Author

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights