NOTICE: Branded Content
NOTICE: Certain versions of content (“Material”) accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.
Protect Your Assets
cancel

What happens when you get to use as much ArcSight as you want

What happens when you get to use as much ArcSight as you want

Security_Guest Absent Member.

Guest post by Mary Writz Director of Product Management, ArcSight

Did you know more data has been created in the past few years than in the entire previous history of the human race? Cyber security is no exception – there are massive amounts of logs and data being generated, and very innovative and useful ways to detect threats if you can bring in enough of that data into an analytics platform. The problem is that most SIEM and analytics vendors charge by data ingestion, so the more data you bring into your environment for threat detection, the more you pay –there is a financial penalty for simply trying to do the right thing.

All you can eat.pngWhat if that could change? 

ArcSight has a new pricing model where customers are no longer charged by data ingestion. It's been extremely popular with our customers.  Here's why: 

1.   Use as much as you want

We anchor pricing to the company size and not to data ingest. It's a three-year term meaning you have unlimited access to use as much ArcSight software as your heart desires. This means you can bring in ALL your data to ArcSight and not worry about increasing costs over time.  

2.   Detect more threats

This new pricing combined with our new massive ingestion capability (1M+ EPS per cluster) and correlation capability (100k EPS per cluster) means you can bring all your data into the ArcSight suite and take advantage of our detection trinity - where you can detect known threats, unknown threats, build a security big data lake, and have full hunt and exploration capability.  

3.   Explore

All our new products are included in the price bundle meaning you have access to all the latest and greatest capabilities:

  • Our Vertica powered hunt and analytics tool, Investigate.
  • Our de-identification of data at the connector level to protect sensitive data, while maintaining usability of data for analytics and applications, enabling data privacy compliance to regulations such as the GDPR.
  • Our Event Broker which provides stream analytics, normalization, and more in a highly scalable message bus.
  • Our new distributed correlation capabilities in ESM. 

We want you to dream big when it comes to detecting threats, without paying a penalty!  

Find out more about our latest innovations, which include the first distributed correlation solution for Security Information and Event Management (SIEM), enabling Security Operations Centers (SOCs) to become agile, expand their cyber security footprint, and respond quickly to evolving threats at massive scale. 

0 Kudos
About the Author

Security_Guest