RSA, The Security Division of EMC

rsa-header

Overview



redefine-authentication


RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing physical, virtual and cloud environments.

Archer

RSA Archer GRC: RSA Archer GRC modules allow you to build an efficient, collaborative enterprise governance, risk, and compliance (GRC) program across IT, finance, operations, and legal domains. With RSA Archer, you can manage risks, demonstrate compliance, and automate business processes.

Building your GRC Program

RSA Archer enterprise governance, risk, and compliance (GRC) allows you to manage the lifecycle of corporate policies, assess and respond to risks, and report compliance with internal controls and regulatory requirements across your enterprise.

Tailoring GRC

Enable business users to configure RSA Archer GRC according to your organization's unique governance, risk, and compliance processes through point-and-click configuration—no custom code required.

Expanding your GRC Program

Easily create new solutions with the RSA Archer GRC platform or download applications created by risk and compliance experts from RSA Archer GRC Exchange.

Using GRC Content Library

Take advantage of RSA's comprehensive knowledge base of GRC content which includes pre-mapped policies, control standards, procedures, authoritative sources, and assessment questions.

Reporting and Dashboards

Gain a current view of your GRC activities through RSA Archer reports and dashboards which provide users at every level with the information they need to complete tasks and make informed decisions.

Data Loss Prevention

RSA Data Loss Prevention (DLP): Discover and monitor the location and flow of sensitive data such as customer credit card data, employee PII, or corporate intellectual property. Educate end users and enforce controls to prevent loss of sensitive data through email, web, PCs, smartphones, and more.

Comprehensive Coverage

Prevent the loss of sensitive data through many risk vectors, including email, webmail, social media, FTP, Web, Web 2.0, PCs, virtual machines, smartphones, Microsoft SharePoint, file servers, NAS/SAN, databases, and USB devices.

Accurate Classification

Identify sensitive data with industry-best accuracy through RSA DLP's combination of cognitive sciences-based content classification, machine-based fingerprinting, rich metadata analysis, and purpose-built expert policies.

User Education

Rely on RSA DLP to monitor the actions users take on sensitive data and educate them in real time on policy violations. This improves risk awareness among end users, influencing their behavior in dealing with sensitive data.

Platform Integration

Integrate RSA DLP with many enterprise platforms, including Microsoft, Cisco, EMC, VMware, Citrix, McAfee, Symantec, Trend Micro, and Blue Coat, to maximize utilization of your current infrastructure.

Workflow Automation

Improve DLP project management by leveraging a people- and process-centric automated workflow for policy management, incident remediation, and reports management.

ECAT

RSA ECAT: An innovative endpoint compromise-assessment and monitoring tool that enables enterprises to detect and respond to advanced 
threats. ECAT's unique signature-less approach identifies previously unknown malware and compromises that other solutions miss.

Gain Endpoint Visibility

Uncover potential compromises with RSA ECAT's deep, extensive visibility across all Windows hosts in the enterprise.

Detect Advanced Threats

Identify even the most advanced threats, including those that leverage zero-day exploits, and targeted, customized malware. RSA ECAT's unique signature-less approach finds threats others miss.

Obtain Actionable Intelligence

Detect and validate compromised machines quickly and correlate to other infected hosts across the enterprise.

Increase SOC Agility

Gauge the magnitude of an intrusion and reduce incident response time in your Security Operations Center using the speed and scalability of RSA ECAT.

SecurID

Establish an enterprise-wide authentication policy that protects your most valuable applications, resources, and information.

RSA Authentication Manager

Centrally manage two-factor authentication functions, security tokens, and users across the enterprise.

RSA Risk-Based Authentication

Increase security transparently by preserving the familiar username/password logon experience for users.

RSA SecurID Software Authenticators

Provide software-based two-factor authentication security tokens to users on mobile smartphones, tablets, and PCs

RSA SecurID Hardware Authenticators

Provide convenient, hardware-based two-factor authentication security tokens for your users.

RSA SecurID Authentication Agents

Enable direct requests for two-factor authentication from key infrastructure to RSA Authentication Manager.

RSA SecurID Authentication Engine

Easily authenticate RSA SecurID users by integrating the backend functions of SecurID into applications.

Security Analytics

RSA Security Analytics: A security monitoring platform that leverages and extends the architecture and analytics of RSA NetWitness. Security Analytics redefines SIEM by combining network monitoring, traditional log-centric SIEM, forensics, compliance, and big data management and analytics.

Big Data Security

Capture massive amounts of diverse and rapidly changing security-relevant data – including network packets, logs, and asset information – and pivot on terabytes of data in real time, executing forensic investigations that once took days in just minutes.

High-Powered Analytics

Gain the insight to perform both short- and long-term free-form contextual analysis, eliminating blind spots and enabling security analysts to view and understand data better and faster than ever before.

Threat Intelligence

Fuse threat intelligence from the global security community and RSA FirstWatch with your organization's data to know what to look for and leverage what others have already uncovered.

Compliance Support

Automate the generation of compliance reports and support long-term forensic analysis, proving compliance as an outcome of good security practices.

Silvertail

RSA Web Threat Detection: Software that collects and analyzes massive amounts of real-time data from website traffic to provide web session intelligence and real-time analysis of user behavior.
Icon

Real- Time Threat Detection

An innovative and functional user interface helps simplify threat detection and investigation by leveraging big data analytics in the form of web session intelligence and one-click incident investigation.

Enhanced Visibility

Receive greater insight into the online threat environment. Equipped to provide visibility into third-party sites, RSA Web Threat Detection defends against attacks originating outside your web session.

Streaming Analytics

Support more intelligent, risk-based behavioral threat detection with a real-time, click-by-click threat-scoring platform. The self-learning statistical models and web session intelligence platform dynamically adjust to account for changes in usage patterns and the website.

In-line Visibility, without the hassle

Integrate into your network infrastructure. Scalable and adaptable, RSA Web Threat Detection mirrors all traffic from a SPAN port with no impact to the end user.

Contact us

Enquire about RSA


rsa-logoRSA offers Intelligence-driven Security solutions that help organizations mitigate the risk of operating in a digital world. The company's solutions provide the visibility, analysis, and actions that organizations need to detect, investigate, and respond to advanced threats; confirm and manage identities; and prevent online fraud and cybercrime.