Solera Networks and ArcSight Join Forces to Provide Network Security and Forensics Solution
November 10th, 2009
“SALT LAKE CITY, UT — November 10, 2009 – Solera Networks has partnered with ArcSight, Inc. (NASDAQ: ARST) to enable integration between their high-speed network forensics appliances and ArcSight’s enterprise threat and risk monitoring solutions. This integration will help determine the true scope of any network or security issue by providing a record of network traffic and replay capabilities to event notifications.
“We have a number of customers who rely on ArcSight to perform valuable security event notification and management,” said Peter Schlampp, VP of Marketing and Product Management. “Integration of Solera DS network forensics appliances with the ArcSight Security Information and Event Management (SIEM) platform will give them automated full-fidelity replay of any network event notification, helping them determine the true scope of the entire event for swift remediation.”
ArcSight is a leading global provider of security and compliance management solutions that protect enterprises and government agencies. ArcSight has taken a leadership role in the security industry by developing a log management standard that SIEM vendors, customers and partners can leverage to develop their own valuable innovations in security technology.
“In order to reduce the risk posed by targeted threats, organizations need to be able to quickly determine the scope and nature of a network event,” said Jeff Scheel, senior vice president of business development at ArcSight. “The forensic solutions from Solera Networks provide clearer context through traffic capture and replay. Adding these capabilities to the ArcSight SIEM platform broadens the scope of tools available for fighting cyber crime and managing enterprise risk.”
Solera DS forensics appliances capture all network traffic, even on today’s fastest 10Gb networks. The available REST web services APIs will allow ArcSight’s threat and risk monitoring solutions to deliver automated requests to Solera DS forensics appliances for slices of network traffic. These slices can be based on time, protocol, source/destination port and many other network parameters.
The Solera Networks appliance sits passively on a network, records all network traffic, indexes all traffic, and provides complete searching and replay of any event with its associated artifacts.”