RSA’s industry leading solutions are designed to work together to create a systematic
approach to managing security, risk and compliance – eliminating the hundreds of
security and compliance silos that exists in most organizations today. Our technology
solutions for physical, virtual and cloud computing environments include:
RSA offers a wide range of strong two-factor authentication solutions to help organizations assure user identities and meet compliance requirements. Choices include one-time passwords, risk-based authentication, knowledge-based authentication and digital certificates. RSA authentication solutions are available in a variety of form factors including hardware authenticators, software authenticators delivered across a range of mobile devices and platforms, out-of-band phone and SMS options, and site-to-user authentication.
RSA access control solutions manage access, federate identities and enforce
organizational policies across multiple web resources, portals and applications. These
solutions make it easy to manage a large number of users while enforcing a centralized
security policy that ensures compliance and prevents unauthorized access to corporate
systems and sensitive information.
Data Loss Prevention
RSA data loss prevention (DLP) solutions identify and enforce policies to prevent the loss
or misuse of sensitive data – whether at rest in a data center, in motion over the
network, or in use on a laptop or desktop.
Encryption, Tokenization, and Key Management
RSA encryption and tokenization solutions secure sensitive data stored in file systems on
servers and endpoints and at the point of capture. RSA key management solutions offer a
common infrastructure to simplify the provisioning, distribution and management of
RSA fraud prevention solutions reduce the risk of fraud and identity theft by assuring
user identities, monitoring for high-risk activities and mitigating the damage caused by
external threats such as phishing, pharming, Trojans and other cyber threats.
Enterprise Governance, Risk and Compliance
RSA enterprise governance, risk and compliance (eGRC) solutions enable organizations to
manage the lifecycle of corporate policies and objectives across a number of domains;
analyze and respond to enterprise risk and demonstrate compliance. Through a series of
easy-to-read dashboards and reports, RSA eGRC solutions provide organizations with a
real-time view into their state of compliance and risk level.
Network Security Monitoring
The RSA network security monitoring solution provides organizations with real-time
visibility into network traffic and log event activity for a precise and actionable
understanding of everything happening on the network. With pervasive visibility,
organizations can identify, prioritize and remediate complex IT risks, gain efficiencies in
their incident management process and improve their overall operational effectiveness.
Security Information and Event Management
The RSA security information and event management (SIEM) solution transforms raw log
and event data into critical information to help organizations simplify compliance,
identify and respond to high-risk events, and optimize IT and network operations.
Service and Support Worldwide
RSA provides customers with timely responses to their requests and inquiries with 24x7
support from offices located worldwide. Additionally, our RSA SecurCare® online portal
offers anytime, anywhere access to thousands of documents and help guides containing
the latest critical support information to help organizations maximize their investment in
RSA Professional Services helps organizations successfully implement high-value security
solutions based on RSA industry-leading technology. Leveraging the expertise of its
organization, RSA brings together the technology, services, and know-how necessary to
develop and implement a comprehensive information security strategy.
The RSA Security Practice of EMC Consulting approaches security from a business context
that prioritizes security investments. Services from the Practice specialize in both
security policy and compliance areas such as PCI DSS and HIPAA/HITECH and span areas
such as data classification, information risk management, GRC and policy management,
fraud mitigation, identity assurance, virtualization and security operations.