Overview: RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by RSA, The Security Division of EMC.
Research offered by RSA, The Security Division of EMC
6 Best Practices for Preventing Enterprise Data Loss by RSA, The Security Division of EMC. February 05, 2009 - Nearly 220 million electronic records have been breached since January 2005, according to Privacy Rights Clearinghouse. This paper outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements.
A Comprehensive Introduction to RSA SecurID User Authentication by RSA, The Security Division of EMC. November 01, 2006 - This white paper examines a two-factor authentication solution that helps efficiently manage the authentication of your company's users who access your network and web-based applications.
A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by RSA, The Security Division of EMC. February 19, 2009 - Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends.
A Prudent Approach to Risk Management by RSA, The Security Division of EMC. February 01, 2011 - Today's organizations are in need of more comprehensive and continuous risk management programs. Unfortunately, many do not have the appropriate processes, skills or technology foundation to meet this goal. Access this resource to uncover a prudent approach that uses three simple steps to help advance your risk management cause.
Addressing Security Risks and Challenges in a Changing IT Environment by RSA, The Security Division of EMC. October 31, 2012 - In this resource, understand the need for stronger authentication systems to combat the risks of mobility and virtualized environments. Discover a platform offering a one-time password feature that ensures all-around data protection.
Advanced Threats: The New World Order by RSA, The Security Division of EMC. October 25, 2011 - This paper examines the state of advanced threats on the front lines, as seen by the companies, law enforcement officials and government leaders. View now to gain a better understanding of these emerging threats, its challenges to all organizations and how to defend against them.
Akershus University Hospital: Safeguarding patient privacy with security information and event management by RSA, The Security Division of EMC. May 17, 2009 - Since 1995, a series of new European regulations have been introduced to protect the security and privacy of personal data held by corporations and public bodies, particularly concerning the logging of access to sensitive information. Read this case study to learn how RSA keeps Akerus University Hospital secure and compliant.
An Overview and Competitive Analysis of the One-Time Password (OTP) Market by RSA, The Security Division of EMC. October 14, 2010 - The landscape of the OTP market is changing as more organizations are searching for convenient solutions such as mobile authenticators. Growth in the market will center on providing these types of alternative mobile solutions for end-users. Read this paper to find out so much more.
Assuring User Identities During a Business Disruption: Applying a Consistent Strong Authentication Policy to Business Continuity Planning by RSA, The Security Division of EMC. August 2009 - This white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency. Read on to learn more.
Beating the Bad Guys: Strategies to Mitigate the Malware Threat by RSA, The Security Division of EMC. November 23, 2011 - While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Breaking Through The Value Ceiling by RSA, The Security Division of EMC. December 05, 2013 - In this white paper, gain information to determine whether your governance, risk and compliance (GRC) tools have yet to maximize their full value, and discover 3 ways that you can go beyond to bring significant ROI.
Build a Solid Foundation for Secure Virtualization by RSA, The Security Division of EMC. December 30, 2010 - Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security?
Building an Infrastructure That Enables Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - This paper takes the next logical step by guiding organizations in establishing the criteria for an infrastructure to help realize best practices and build a technology strategy for comprehensive security information and event management.
Creating an Effective Security Operations Function by RSA, The Security Division of EMC. October 2008 - Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient.
Cybercrime and the Healthcare Industry by RSA, The Security Division of EMC. June 21, 2011 - As technologies in healthcare continue to evolve, so will the cybercriminal activity targeted at healthcare organizations progress as well. This paper takes a look into cybercrime in the healthcare industry and discusses why access to data and information is fast becoming a target of scrutiny and risk.
Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. March 27, 2012 - This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy.
Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. December 02, 2010 - As a result of the financial crisis beginning in 2008, companies are faced with an ongoing dilemma: reduce costs now while maintaining an appropriate risk management structure and preparing for the impending increase in regulatory demands.
End-to-end Solutions to Enable Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - This third paper in the series, describes end-to-end solutions that combine security information and event management (SIEM) and tiered storage technologies based on the RSA enVision platform and EMC networked storage solutions.
Financial Institutions: Managing Operational Risk with RSA® Archer® by RSA, The Security Division of EMC. November 30, 2013 - Access this white paper to discover a solution that today's financial institutions can use to balance risk quantity with management quality in order to ensure an efficient and effective program.
Four Best Practices for Secure Web Access by RSA, The Security Division of EMC. June 01, 2009 - Read this white paper to learn best practices organizations can use to improve their ability to secure sensitive data and in turn, protect revenue, prevent the erosion of customer confidence and brand value, and meet the demands of regulatory compliance.
Gartner's Magic Quadrant for Security Information and Event Management 2008 by RSA, The Security Division of EMC. October 2008 - Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Getting Ahead of Advanced Threats - Achieving Intelligence-Driven Security by RSA, The Security Division of EMC. March 07, 2012 - With today’s advancing threat landscape, traditional approaches to information security are no longer enough. Instead organizations need to take an intelligence-driven approach to more effectively detect and mitigate cyber attacks. View now to explore the growing need for intelligence-driven security and uncover a 6-step approach for achieving it.
How Risk-Based Authentication is Shifting Control Back to Organizations by RSA, The Security Division of EMC. November 15, 2013 - In this comprehensive resource, discover a cost-effective, risk-based authentication solution that addresses the need for more layered security to protect data in an increasingly mobile business world.
How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC. December 01, 2010 - Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.”
Impact Brief: Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. August 31, 2010 - Faced with some of the greatest challenges in history, companies are focusing on cutting costs and more stringent fiscal management. Regardless of industry, organizations are reassessing investment budgets, reducing staff and implementing other measures to reduce operational expenses across all business disciplines.
Impact Brief: How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC. July 28, 2010 - To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.
Key Findings RSA Archer GRC Executive Forum by RSA, The Security Division of EMC. December 06, 2013 - In this white paper, review governance, risk, and compliance (GRC) best practices from your peers based on their industry experience, and understand the true value behind these tools to maximize your investment in security.
Leading Indian Bank Accelerates Compliance Processes and Improves Operations with RSA® Archer® eGRC Suite by RSA, The Security Division of EMC. January 31, 2013 - In this case study, learn how HDFC Bank is benefiting after implementing an automated governance, risk, and compliance solution that keeps assets protected even with the scalable demands of a growing online banking environment.
Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Log Management E-book by RSA, The Security Division of EMC. June 24, 2009 - Log management is covering several important aspects of network security. The four major chapters of this E-book focus on the use of log management as it pertains to compliance, analysis, forensics, and an SIEM alternative. Read on to learn more.
Making the FACTA Red Flags Rules Operational by RSA, The Security Division of EMC. October 2008 - Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Mobile Devices Spur New Security Paradigm by RSA, The Security Division of EMC. November 15, 2013 - In this resource, gain critical insight on how to boost mobile device management (MDM), and the need for additional levels of user authentication protocols for mobile business applications to ensure confidential corporate data remains protected from unauthorized users.
Ovum: Corporate eGRC update by RSA, The Security Division of EMC. December 01, 2010 - This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future.
Presentation Transcript: Authentication: Addressing the new Cloud, Mobile and Advanced Threats Environment by RSA, The Security Division of EMC. July 25, 2012 - Today's evolving IT environment and trends are providing vast opportunities for organizations – and a new array of security challenges. This webcast examines the emerging technologies and trends and explores 4 distinctive strong authentication technologies to help protect against the changing threat landscape.
Protecting CPNI - Top Four Tips for a Successful Security Program Deployment by RSA, The Security Division of EMC. December 2008 - With the RSA CPNI Solution, telecommunications service providers can rest assured that they will not suffer financial or brand repercussions as a result of unauthorized disclosure of CPNI.
Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC. June 01, 2009 - This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization.
RSA Customer Profiles: RSA® Archer® eGRC by RSA, The Security Division of EMC. December 04, 2013 - Access this collection of case studies to see how a variety of organizations are benefiting from a unified, comprehensive governance, risk, and compliance (GRC) management solution that offers accurate and continuous policy enforcement and reporting features.
RSA Data Loss Prevention Suite: Uncover Your Risk, Establish Control by RSA, The Security Division of EMC. February 05, 2009 - Check out this white paper to learn how RSA Data Loss Prevention mitigates risks to sensitive data, achieves scalability, and lowers total cost of ownership.
RSA SecurID Authenticators by RSA, The Security Division of EMC. November 27, 2006 - Download this white paper and learn about a two-factor authentication solution that is easy to implement, cost-effective and helps secure internal and remote network access for your company.
RSA Security Information and Event Management (SIEM) Deployment Guide by RSA, The Security Division of EMC. December 10, 2010 - The Cisco Smart Business Architecture for Enterprise offers partners and customers valuable network design and deployment best practices; helping organizations deliver superior end-user experiences that include switching, routing, security, and wireless technologies combined with the comprehensive management capabilities for the entire system.
RSA Solution for Cloud Security and Compliance by RSA, The Security Division of EMC. December 23, 2010 - This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.
Securing the Administration of Virtualization by RSA, The Security Division of EMC. March 10, 2010 - In this report, Enterprise Management Associates (EMA) describes a systematic approach to securing the administration of virtualized systems, based on the ISO 27000-series “Plan – Do – Check – Act” philosophy. Read on to gain an enhanced awareness of the essential capabilities required for the secure administration of virtualization.
SIEM and DLP Together: A More Intelligent Information Risk Management Strategy by RSA, The Security Division of EMC. December 17, 2009 - This paper explores examples of how DLP and SIEM together can make for more intelligent information risk management.
Six Best Practices to Prevent Enterprise Data Loss by RSA, The Security Division of EMC. February 05, 2009 - Join Tom Corn, Vice President of Data Security Products at RSA, The Security Division of EMC as he discusses six best practices for preventing enterprise data loss. Hear how these best practices enable you to protect your critical data throughout its lifecycle -- no matter where it moves, who accesses it or how it is used.
Strong Authentication to Cloud-Based Applications by RSA, The Security Division of EMC. September 30, 2012 - Access this resource for valuable information regarding an authentication solution that integrates identity federation. Learn how you can provide users with the benefits of single sign-on (SSO), creating a more secure virtualized environment.
Taking Charge of Security in a Hyperconnected World by RSA, The Security Division of EMC. October 31, 2013 - Access this resource to uncover the top mistakes IT managers are making in their security strategies, and why they need a more continuous approach to improving defense systems in today's ever changing threat landscape.
The Case for Risk-Based, Business-Aligned Internal Audit by RSA, The Security Division of EMC. December 01, 2010 - The world we operate in as business professionals is rapidly changing. Organizations are faced with the increasing complexities of global operations, the growing morass of regulatory demands, pressures to decrease cost and increase efficiency, and the prospect of dealing with a set of new and potentially catastrophic risks.
The Evolution of Information Security Management: 4-Phased Maturity Model by RSA, The Security Division of EMC. March 27, 2012 - Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.
The Forrester Wave™: Risk-Based Authentication, Q1 2012 by RSA, The Security Division of EMC. February 22, 2012 - This white paper reviews the top six risk-based authentication (RBA) vendors in the market today. Discover the pros and cons of each and how they stack up to one another. Review evaluations of each based on 16 key criteria, including customer satisfaction, mobile strategy, product revenue, and much more.
The Role of Governance, Risk Management & Compliance in Organizations by RSA, The Security Division of EMC. May 02, 2011 - Meeting enterprise Governance, Risk and Compliance (eGRC) objective is very challenging in today’s IT world. This white paper outlines the results of a study that surveyed 190 individuals from one of the largest eGRC practitioner communities.
The RSA Authentication Decision Tree by RSA, The Security Division of EMC. September 25, 2012 - Consult this white paper to use the authentication decision tree - a tool to help you understand, evaluate and select the most appropriate authentication solution to meet the needs of your business and customers.
The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business by RSA, The Security Division of EMC. March 18, 2009 - This white paper provides an overview of the Authentication Decision Tree; examines the five factors critical to selecting an authentication solution; and offers a clear guide to selecting the right solution that effectively balances risk, cost and end user convenience.
The RSA GRC Reference Architecture by RSA, The Security Division of EMC. June 30, 2013 - With businesses continue to focus on governance, risk and compliance (GRC), IT professionals have to maintain efficient security policies. This in-depth white paper outlines the importance of a GRC policy and how it can help your business.
Thor Technologies, Inc.: Xellerate®, Secure Enterprise Provisioning System Integrates with RSA ClearTrust® to Provide Enhanced User Management by RSA, The Security Division of EMC. June 07, 2004 - Xellerate®, combined with RSA ClearTrust® software, provides a comprehensive solution that delivers centralized authentication and secure access management as well as user self-service and workflow capabilities.
Top 3 Tips to Securing Your Portal - And Protecting Your Customer by RSA, The Security Division of EMC. February 2008 - Enterprises are striving to accelerate their businesses by sharing core business data across all channels. Learn how you can strengthen your organization's portal(s), improve customer security and inspire customer confidence.
UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk by RSA, The Security Division of EMC. March 27, 2012 - Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more.
Using a Risk-Based Approach to Address a Changing Threat Landscape by RSA, The Security Division of EMC. January 31, 2013 - In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.
Why Passwords Aren't Strong Enough by RSA, The Security Division of EMC. January 31, 2011 - In this white paper, uncover the urgent need for strong authentication, and how investing in one-time password technology will not only keep your assets protect, but also deliver high ROI in the long-run.
Why Passwords Aren't Strong Enough: Making the Case for Strong Authentication by RSA, The Security Division of EMC. February 10, 2012 - With today’s advanced threat landscape and the increased value placed on information, relying on static passwords is no longer enough. This resource explores the need to strong authentication and the ROI benefits you can gain.
Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication by RSA, The Security Division of EMC. August 30, 2010 - In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.
You Are the Target - But You Don't Have To Be with Effective Authentication by RSA, The Security Division of EMC. August 31, 2013 - In this analyst report by Frost & Sullivan, uncover 5 case studies on organizations of all sizes that found passwords to be subpar in security measures. Learn how they benefited from a multi-factor authentication platform, which ensured that only authorized users could access their private, dynamic networks.