Security Analytics 8.1: Now Available
What’s New in Security Analytics 8.1
Symantec Security Analytics 8.1 is now available, adding new capabilities to Symantec’s powerful network traffic analysis and forensics solution. Enhancements include: added support for deployment in Microsoft Azure, Session View for easy evidence discovery, Intelligent Capture, ICDx integration, Dynamic Storage Expansion, Splunk>Phantom integration, Threat Explorer Pivot integration, and a new Dark Theme UI to better align with SOC preferences.
Security Analytics 8.1 Additions:
- Session View – Quickly get details of all network flows
- Intelligent Capture – Only retain packets deemed necessary for long-term storage and optimize available storage
- Dynamic Storage Expansion – Add storage without reinstalling software or destroying already captured packets and metadata
- Integrated Cyber Defense Exchange (ICDx) Integration – Automatically share event metadata to ICDx for further analysis or to execute security and remediation actions
- Splunk>Phantom Integration – Automate the orchestration of defined plays for further data enrichment or remediation
- Threat Explorer Pivot Integration – Pivot from artifacts to Threat Explorer for detailed reputation on URLs, IP addresses and files
- Dark Theme UI – Dark theme option supports SOC teams’ preferences for more comfortable, extended viewing time
Comprehensive Network Traffic Analysis and Forensics to Expose the Source and Scope of Any Attack
Like a security camera or DVR for your network.
Symantec Security Analytics delivers enriched, full-packet capture for full network security visibility, advanced network forensics, anomaly detection, and real-time content inspection for all network traffic. Armed with this detailed record, you can conduct forensic investigations, respond quickly to incidents, and resolve breaches in a fraction of the time you would spend with conventional processes. Security Analytics is an advanced network traffic analysis and forensic tool enabling you to:
- Thoroughly analyze all network traffic
- See the full source and scope of cyber attacks and respond faster
- Arm incident response teams with clear, concise answers and forensic evidence
- Use unrivaled data enrichment and cyber threat intelligence
- Add context to existing security tools
- Integrate with Symantec solutions to extend investigations across network, endpoint and email
Know Your Security Risks at the Push of a Button
Get advanced network traffic analysis and forensics to see what's happening on your network.
Simply deploy Security Analytics appliance or virtual appliance on your network and capture traffic. Let it run for a few days, then push a button and generate a comprehensive PDF report that covers full network traffic analysis and critical areas including:
- Predicted file count hidden in encrypted traffic
- The amount of encrypted traffic crossing your network
- Risky applications on the network
- Anomalous network behavior based on a benchmark of your actual traffic
- An executive summary to share with security team or management so you can prioritize activities
Four Years in a Row Symantec Selected as the Top Leader in Radicati's APT Protection Market Quadrant 2019 report
The Radicati group views the Advanced Persistent Threat (APT) Protection market as a set of integrated solutions for the detection, prevention and possible remediation of zero-day threats and persistent malicious attacks. Once again, Symantec Security Analytics plays a critical role in Symantec's being selected as the Top Leader in their 2019 report.
Go Beyond Manual Forensics and Packet Capture
Transform manual forensic data analysis into advanced network traffic analysis and automated incident response.
With a fully enriched "system of record," your incident response teams will reduce time to resolution and answer the what, when, and how of any security incident. Find answers through comprehensive network traffic analysis and forensic evidence, including root-cause exploration, deep packet inspection, integrated reputation services and data enrichment, and advanced context-based reporting on malicious activity.
- Enrich all traffic data with the latest cyber threat intelligence
- Rely on multiple reputation sources
- Perform sophisticated anomaly detection
- Scan SCADA protocols
- Extract and broker only truly unknown files for sandbox analysis to save resources
Threat Hunting: A Proactive Approach to Forensic Investigation and Cybersecurity
Why react when you can act?
With Symantec Security Analytics, your IT security team gets forensic tools and traffic analysis to proactively search for potential hidden threats and potential gaps across your network, endpoint and servers, to identify and remove advanced threats before they can launch an attack.
- Expose the source and scope of a developing attack with unrivalled data enrichment and threat intelligence
- Uncover hidden threats in encrypted traffic when deployed with Symantec SSL Visibility
- Reduce time-to-resolution with sophisticated anomaly detection and advanced network forensics
- What's the difference between Incident Response and Threat Hunting? Read the blog.
Uncover Security Threats Hiding in Encrypted Traffic
Gain total visibility into network traffic by deploying with Symantec SSL Visibility.
Use Symantec Security Analytics to enable meticulous network forensics and monitoring across all network traffic, thousands of applications, dozens of file transports, all flows, and all packets—including encrypted traffic when deployed with Symantec SSL Visibility. Gain total forensic data analysis of your network traffic with actionable intelligence so you can quickly shut down exposure and mitigate ongoing risk.
- Conduct complete network traffic analysis, even on encrypted data
- See detailed insights from all forensic captures
- Establish policies to selectively decrypt SSL traffic
- Share encrypted traffic insight with your security applications
Symantec Blogs
Symantec Enterprise Division: Sharing Ain’t Always Caring
Phishing and the Era of Abusing File Sharing Services
Posted: 16 Dec, 2019 | 6 Min Read
Symantec Enterprise Division Joins Broadcom
Creating one integrated Cyber Defense Platform
Posted: 18 Nov, 2019 | 2 Min Read
The Tea Cup Security Conundrum, or How to Prevent Targeted Attacks
Endpoint Security protects against hard-to-find threats at every stage of the attack chain, blocking hackers from...
Posted: 18 Nov, 2019 | 9 Min Read
Securing the OSs of Today and Tomorrow
Symantec Endpoint Security is the answer to protecting modern devices – in addition to traditional endpoints...
Posted: 22 Oct, 2019 | 8 Min Read
Discover Our Community
View the latest product discussions in our forums.
Need help?
Technical support and more.
Data Sheets
White Papers
Solution Briefs
Reports
Other Resources
Customer Success
Videos
Legal Information
Learn more about legal terms, policies and notices.



