RSA, The Security Division of EMC, announces the release of Web Threat Detection 6.0

Document created by RSA Link Team Employee on Jul 5, 2016
Version 1Show Document
  • View in full screen mode


RSA, The Security Division of EMC, announces the release of Web Threat Detection 6.0. The release includes the following changes and enhancements. For further details, see the Release Notes and product documentation.

IPv6 Support

Web Threat Detection 6.0 captures Internet traffic that uses IPv6 format in addition to traffic using IPv 4 format. All Web Threat Detection functionality is available for IPv6  transactions, enhancing fraud detection by providing additional visibility into the traffic that hits your website.

RSA eFraudNetwork Integration

The RSA eFraudNetwork is a cross-organizational repository of fraudulent entities gathered from an extensive network of RSA customers and products. When a fraudulent activity is identified, the data elements associated with the activity are shared via the RSA eFraudNetwork. Web Threat  Detection 6.0 allows you to identify threats reported worldwide through connection to the RSA eFraudNetwork and use IP addresses marked as fraudulent on the eFraudNetwork in Web Threat Detection rules.

Multi-tenancy Definition by URL

Web Threat Detection 6.0 allows a customer using a multi-tenancy configuration to define tenants by URL for enhanced flexibility to create tenants by domain. In previous versions of Web Threat Detection, a customer can define tenants by IP only.

Enhanced Data Capturing

Web Threat Detection 6.0 allows you to capture data using the following methods in addition to the previously supported HTTP methods:

* the DELETE HTTP method

* multi-part forms containing "Content-Disposition: form-data"



For additional documentation, downloads, and more, visit the RSA Web Threat Detection page on RSA Link


EOPS Policy:

RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the Product Version Life Cycle for additional details.