{"id":1607,"date":"2013-01-30T00:00:00","date_gmt":"2013-01-30T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/01\/30\/solera-networks-becomes-industrys-first-security-intelligence-and-analytics-solution-with-common-cr\/"},"modified":"2021-12-30T11:39:41","modified_gmt":"2021-12-30T11:39:41","slug":"solera-networks-becomes-industrys-first-security-intelligence-and-analytics-solution-with-common-cr","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/01\/30\/solera-networks-becomes-industrys-first-security-intelligence-and-analytics-solution-with-common-cr\/","title":{"rendered":"Solera Networks Becomes Industry&#8217;s First Security Intelligence and Analytics Solution with Common Cr"},"content":{"rendered":"<p>Solera Networks, the industry&#8217;s leading Big Data Security Intelligence and Analytics provider, today announced that Solera DeepSee Software and Solera DeepSee Central Manager have been awarded Common Criteria Evaluation Assurance Level 3+ certification.   Common Criteria certification is recognized in over 25 countries as a critical validation of security technology, and will make the Solera DeepSee Platform more accessible to federal agencies and commercial enterprises. It also assures commercial businesses that a product has been certified as meeting a standard measure of security, whether it is used internally or in solutions for customers. &#8230;  Solera DeepSee Software and Solera DeepSee Central Manager were evaluated under the terms and conditions of the Common Criteria Scheme and were certified to comply with the requirements for EAL 3+ Common Criteria Assurance Level.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Government entities holding a wealth of information crucial to the nation&#8217;s safety and security have become keenly aware of the critical need for best-of-breed and massively scalable Security Intelligence and Analytics capabilities to prepare for the inevitability of attacks and security breaches,&#8221; said Yiannis Vassiliades, VP of Product Management at Solera Networks. <\/p>\n<p>Solera DeepSee delivers security intelligence and advanced threat protection through full network visibility, big data security analytics and comprehensive threat intelligence-essential components required by government agencies facing today&#8217;s volatile and constantly evolving threat landscape. &#8230;  In addition to providing visibility of advanced threats and malware that fly under the radar of traditional security technologies, DeepSee allows organizations to respond to security incidents in real-time-further enabling them to replay and review attacks in full fidelity to answer critical post-breach questions, mitigate risk and further protect the organization from attack.<\/p>\n<p>Link: http:\/\/bw.newsblaze.com\/story\/2013012906123900001.bw\/topstory.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1607","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1607"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1607\/revisions"}],"predecessor-version":[{"id":4094,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1607\/revisions\/4094"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}