EMC (News - Alert) Corporation recently revealed that it will acquire privately-held Silver Tail Systems, a company that conducts real-time Web session intelligence and behavioral analysis. The acquisition is expected to be completed in the fourth quarter of 2012.
As a result of the acquisition, Silver Tail will operate within the RSA (News - Alert) security division. According to EMC officials, the acquisition will help the company further build its capabilities of RSA Identity Protection and Verification (IPV) solutions, as well as other areas across RSA's enterprise security portfolio.
Silver Tail Systems provides Web Session Intelligence and behavioral analysis to secure your website, stop fraud, prevent business logic abuse, and detect other malicious activity. The company’s solutions are globally deployed in large customer environments, helping to secure online banking traffic, ecommerce, government websites and portals.
"The industry is well beyond the point of providing effective security using static, perimeter point tools that fail to keep up with dynamic cyber attackers. Customers need better intelligence, analytics, and the ability to respond in real time which is a capability that Silver Tail's products do extraordinarily well to help foil web-based attacks,” explained Art Coviello, RSA executive chairman and executive VP, EMC Corporation in a statement.
“Silver Tail offers proven anti-fraud solutions that complement RSA's portfolio of risk-based and adaptive products and services. We see tremendous opportunity with Silver Tail at the intersection of Big Data and security to leverage our collective expertise and technologies to move beyond the hype to execute on the vision of intelligence-driven security that is risk-based, agile and contextual."
Tim Eades, CEO, Silver Tail Systems, said, "Stopping cybercrime has never been harder than it is today. The recent attacks on the North American banking infrastructure are stark reminders of the pace of innovation in the cybercriminal ecosystem, the convergence of the fraud and info-security attack techniques and the profound responsibility of the CISO to help defend against these attacks.”