RSA: Business-Driven Security

RSA is trusted throughout the world, by the largest and most prominent businesses and governmental agencies to help them protect what matters most to their success. RSA’s industry-leading products are complemented by a force of Cybersecurity and Risk Experts, located around the globe, with a single purpose of helping our customers realize the confidence and countless other benefits derived from Business Driven Security.

 

RSA ID Plus - Powerful cloud solutions to support your digital transformation at your own pace

ID Plus offers three levels of cloud solutions, tailored to fit every identity and access management requirement. All of the solutions can be flexibly deployed in the cloud, on-premises, or hybrid with an open, extensible identity platform. The solutions also can be easily adjusted to meet the pace and evolution of your modernization.

Ultimate security; Complete IAM solution in a single license; Flexible deployment model; Available in cloud, hybrid
or on-prem deployments; Licensing model allows for better budgeting predictability.

ID Plus E1
Secures access to cloud-based applications, systems, and users. ID Plus E1 includes:
• Multi-factor authentication (MFA)
• Access: Attribute and role-based access controls, single sign-on, and web portal
• Customer success and support: Online community access, 9x5 support

ID Plus E2
Combines best-in-class IT with frictionless user access and identity protection in
cloud or hybrid environments. ID Plus E2 includes:
• Multi-factor authentication (MFA)
• On-premises, hybrid, and cloud protection for applications and endpoints
• Access: Attribute, role-based and conditional rule-based, adaptive access controls;
customizable web portal and SSO for unlimited applications
• Customer success and support: Customer Success Manager* and 24x7 support

ID Plus E3
Purpose-built for security-first, highly complex environments that require future-proofed security. ID Plus E3 includes:
• Multi-factor authentication (MFA)
• Dynamic risk-based authentication
• Access: Attribute, role-based and conditional rule-based, adaptive access controls; customizable web portal and SSO for
unlimited applications
• RSA® Risk AI: Advanced risk-engine capabilities and real-time insights
• Customer success and support: Customer Success Manager*, 24x7 support

 

RSA Mobile Lock - Threat detection for mobile devices

Detect threats on mobile devices; Establish trust in unmanaged mobile devices; Restrict authentication to protect resources; Prevent threats from spreading during investigations; Accelerate IT team response; Secure mobile device and mobile app; Leave other device functions unaffected.

RSA Mobile Lock detects critical threats to a mobile device and restricts the user’s ability to authenticate until the threat issue is resolved. It allows IT to establish trust by verifying mobile devices across the attack surface, systematically protecting against threats, and securing any device to mitigate those threats.

Respond quickly and confidently to threats.
In the presence of a threat, RSA Mobile Lock supports quick action by alerting the user and preventing them from authenticating into a secured environment and accessing company data, enterprise systems, or customer records. This prevents a threat from expanding beyond one compromised mobile device to reaching all business systems and
data, which could have severe cross-company consequences

Manage both device and app security By only restricting authentication on a user’s device,

Minimize the impact on users.
Rather than locking users out of their own devices, RSA Mobile Lock takes a targeted approach that focuses specifically on the authentication app. While authentication is restricted when a threat is detected, the user can continue to use the device for making calls and other purposes that are unrelated to authenticating to secured resources.

 

RSA®IdentityGovernance and Lifecycle

Point-and-click configurability: RSA Identity Governance and Lifecycle provides an easy-to-use, point-and-click approach for customers to configure the solution for their governance needs. In the rare cases when more customization is needed, Identity Governance and Lifecycle can be customized with SQL, and SQL does not require extensive technical skills.
Access reviews: RSA Identity Governance and Lifecycle supports entitlements to any application and enables administrators to set up fine-grained entitlements for users and groups. This is supported by RSA Identity Governance and Lifecycle’s granular-level access reviews across applications, roles, accounts, user groups, etc., ensuring customers can easily implement their unique or specific governance needs. Broad security portfolio: RSA offers a broad portfolio that includes identity and access management (IAM), threat detection and response, fraud prevention, and governance, compliance and risk (GRC) solutions, as well as our identity governance and administration solution. Customer can reduce complexity and benefit from economies of scale when they implement RSA solutions for a range of requirements.

  

RSA SecurID®Access

RSA SecurID Access provides strong identity assurance by performing risk analytics and evaluating context for authentication decisions. For example, SecurID examines users’ behaviors to determine if access should be allowed, and applies machine learning to self-tune access decisions. RSA SecurID is a leader in the identity and authentication market. Over 25,000 organizations of all sizes around the world use RSA SecurID solutions. RSA SecurID Access was the winner of SC Magazine’s “Best Multifactor Solution award in 2015, 2016 and 2017. l editions of RSA SecurID Access include optional on-premise components. Some customers prefer this deployment method; for example, they may not feel comfortable with or ready to have their deployment hosted outside their infrastructure.
RSA offers three product editions:
•RSA SecurID Access Base –MFA and SSO
•RSA SecurID Access Enterprise –As above, designed for enterprise scalability
•RSA SecurID Access Premium –As above, and adds more advanced risk-based analytics
Additionally, RSA offers the RSA Identity Lifecycle & Governance solution.

Rethink your networking strategy to keep your infrastructure secure. Network virtualization offers a streamlined path for adopting the cloud.
Office365
IAAS
Create connections from your data center to the cloud with a software-defined network. Improve resiliency and uptime from data center to cloud with network virtualization.