Overview: RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by RSA, The Security Division of EMC.
Research offered by RSA, The Security Division of EMC
2013 RSA Archer GRC Summit: Key Findings by RSA, The Security Division of EMC. September 30, 2013 - View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
6 Best Practices for Preventing Enterprise Data Loss by RSA, The Security Division of EMC. February 05, 2009 - Nearly 220 million electronic records have been breached since January 2005, according to Privacy Rights Clearinghouse. This paper outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements.
A Comprehensive Introduction to RSA SecurID User Authentication by RSA, The Security Division of EMC. November 01, 2006 - This white paper examines a two-factor authentication solution that helps efficiently manage the authentication of your company's users who access your network and web-based applications.
A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by RSA, The Security Division of EMC. February 19, 2009 - Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends.
A Prudent Approach to Risk Management by RSA, The Security Division of EMC. February 01, 2011 - Today's organizations are in need of more comprehensive and continuous risk management programs. Unfortunately, many do not have the appropriate processes, skills or technology foundation to meet this goal. Access this resource to uncover a prudent approach that uses three simple steps to help advance your risk management cause.
Advanced Threats: The New World Order by RSA, The Security Division of EMC. October 25, 2011 - This paper examines the state of advanced threats on the front lines, as seen by the companies, law enforcement officials and government leaders. View now to gain a better understanding of these emerging threats, its challenges to all organizations and how to defend against them.
Akershus University Hospital: Safeguarding patient privacy with security information and event management by RSA, The Security Division of EMC. May 17, 2009 - Since 1995, a series of new European regulations have been introduced to protect the security and privacy of personal data held by corporations and public bodies, particularly concerning the logging of access to sensitive information. Read this case study to learn how RSA keeps Akerus University Hospital secure and compliant.
An Overview and Competitive Analysis of the One-Time Password (OTP) Market by RSA, The Security Division of EMC. October 14, 2010 - The landscape of the OTP market is changing as more organizations are searching for convenient solutions such as mobile authenticators. Growth in the market will center on providing these types of alternative mobile solutions for end-users. Read this paper to find out so much more.
Beating the Bad Guys: Strategies to Mitigate the Malware Threat by RSA, The Security Division of EMC. November 23, 2011 - While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Breaking Through The Value Ceiling by RSA, The Security Division of EMC. December 05, 2013 - In this white paper, gain information to determine whether your governance, risk and compliance (GRC) tools have yet to maximize their full value, and discover 3 ways that you can go beyond to bring significant ROI.
Build a Solid Foundation for Secure Virtualization by RSA, The Security Division of EMC. December 30, 2010 - Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security?
Building an Infrastructure That Enables Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - This paper takes the next logical step by guiding organizations in establishing the criteria for an infrastructure to help realize best practices and build a technology strategy for comprehensive security information and event management.
Consumer Web Portals: Platforms At Significant Security Risk by RSA, The Security Division of EMC. December 31, 2013 - These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.
Creating an Effective Security Operations Function by RSA, The Security Division of EMC. October 2008 - Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient.
Cut through complexity: The key to IAM success by RSA, The Security Division of EMC. August 31, 2013 - This Ponemon Institute report sheds light on your organization's level of complexity and how to best reduce it for an effective, yet easy-to-manage identity and access management (IAM) program.
Cybercrime and the Healthcare Industry by RSA, The Security Division of EMC. June 21, 2011 - As technologies in healthcare continue to evolve, so will the cybercriminal activity targeted at healthcare organizations progress as well. This paper takes a look into cybercrime in the healthcare industry and discusses why access to data and information is fast becoming a target of scrutiny and risk.
Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. March 27, 2012 - This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy.
Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. December 02, 2010 - As a result of the financial crisis beginning in 2008, companies are faced with an ongoing dilemma: reduce costs now while maintaining an appropriate risk management structure and preparing for the impending increase in regulatory demands.
End-to-end Solutions to Enable Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - This third paper in the series, describes end-to-end solutions that combine security information and event management (SIEM) and tiered storage technologies based on the RSA enVision platform and EMC networked storage solutions.
Financial Institutions, Merchants, and the Race Against Cyberthreats by RSA, The Security Division of EMC. October 31, 2013 - In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Four Best Practices for Secure Web Access by RSA, The Security Division of EMC. June 01, 2009 - Read this white paper to learn best practices organizations can use to improve their ability to secure sensitive data and in turn, protect revenue, prevent the erosion of customer confidence and brand value, and meet the demands of regulatory compliance.
Gartner's Magic Quadrant for Security Information and Event Management 2008 by RSA, The Security Division of EMC. October 2008 - Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Getting Ahead of Advanced Threats - Achieving Intelligence-Driven Security by RSA, The Security Division of EMC. March 07, 2012 - With today’s advancing threat landscape, traditional approaches to information security are no longer enough. Instead organizations need to take an intelligence-driven approach to more effectively detect and mitigate cyber attacks. View now to explore the growing need for intelligence-driven security and uncover a 6-step approach for achieving it.
How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC. December 01, 2010 - Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.”
Impact Brief: Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. August 31, 2010 - Faced with some of the greatest challenges in history, companies are focusing on cutting costs and more stringent fiscal management. Regardless of industry, organizations are reassessing investment budgets, reducing staff and implementing other measures to reduce operational expenses across all business disciplines.
Impact Brief: How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC. July 28, 2010 - To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.
Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Log Management E-book by RSA, The Security Division of EMC. June 24, 2009 - Log management is covering several important aspects of network security. The four major chapters of this E-book focus on the use of log management as it pertains to compliance, analysis, forensics, and an SIEM alternative. Read on to learn more.
Making the FACTA Red Flags Rules Operational by RSA, The Security Division of EMC. October 2008 - Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Next Generation Authentication for the Mobile Ready Enterprise by RSA, The Security Division of EMC. April 16, 2014 - This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Ovum: Corporate eGRC update by RSA, The Security Division of EMC. December 01, 2010 - This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future.
Presentation Transcript: Authentication: Addressing the new Cloud, Mobile and Advanced Threats Environment by RSA, The Security Division of EMC. July 25, 2012 - Today's evolving IT environment and trends are providing vast opportunities for organizations – and a new array of security challenges. This webcast examines the emerging technologies and trends and explores 4 distinctive strong authentication technologies to help protect against the changing threat landscape.
Protecting CPNI - Top Four Tips for a Successful Security Program Deployment by RSA, The Security Division of EMC. December 2008 - With the RSA CPNI Solution, telecommunications service providers can rest assured that they will not suffer financial or brand repercussions as a result of unauthorized disclosure of CPNI.
Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC. June 01, 2009 - This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization.
RSA Data Loss Prevention Suite: Uncover Your Risk, Establish Control by RSA, The Security Division of EMC. February 05, 2009 - Check out this white paper to learn how RSA Data Loss Prevention mitigates risks to sensitive data, achieves scalability, and lowers total cost of ownership.
RSA SecurID Authenticators by RSA, The Security Division of EMC. November 27, 2006 - Download this white paper and learn about a two-factor authentication solution that is easy to implement, cost-effective and helps secure internal and remote network access for your company.
RSA Security Information and Event Management (SIEM) Deployment Guide by RSA, The Security Division of EMC. December 10, 2010 - The Cisco Smart Business Architecture for Enterprise offers partners and customers valuable network design and deployment best practices; helping organizations deliver superior end-user experiences that include switching, routing, security, and wireless technologies combined with the comprehensive management capabilities for the entire system.
RSA Security Operations Management (SecOps) in Action by RSA, The Security Division of EMC. March 21, 2014 - This informative resource explores a unique security solution that aims to simplify your security management while providing improved security.
RSA Solution for Cloud Security and Compliance by RSA, The Security Division of EMC. December 23, 2010 - This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.
RSA Web Threat Detection - Innovative and Effective Online Threat Detection by RSA, The Security Division of EMC. January 31, 2014 - This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.
Secure Remote Access by RSA, The Security Division of EMC. September 26, 2007 - This product brochure discusses how RSA's Secure Remote Access solution allows organizations to strongly authenticate and positively establish users' identities before granting access to the resources they need to work, regardless of their ...
Securing the Administration of Virtualization by RSA, The Security Division of EMC. March 10, 2010 - In this report, Enterprise Management Associates (EMA) describes a systematic approach to securing the administration of virtualized systems, based on the ISO 27000-series “Plan – Do – Check – Act” philosophy. Read on to gain an enhanced awareness of the essential capabilities required for the secure administration of virtualization.
SIEM and DLP Together: A More Intelligent Information Risk Management Strategy by RSA, The Security Division of EMC. December 17, 2009 - This paper explores examples of how DLP and SIEM together can make for more intelligent information risk management.
Six Best Practices to Prevent Enterprise Data Loss by RSA, The Security Division of EMC. February 05, 2009 - Join Tom Corn, Vice President of Data Security Products at RSA, The Security Division of EMC as he discusses six best practices for preventing enterprise data loss. Hear how these best practices enable you to protect your critical data throughout its lifecycle -- no matter where it moves, who accesses it or how it is used.
Sunbelt Exchange Archiver (SEA): Your Email Archiving Solution by RSA, The Security Division of EMC. August 2008 - SEA is a comprehensive email archiving solution from Sunbelt Software that effectively addresses today's corporate email communication needs.
Taking Charge of Security in a Hyperconnected World by RSA, The Security Division of EMC. October 31, 2013 - Access this resource to uncover the top mistakes IT managers are making in their security strategies, and why they need a more continuous approach to improving defense systems in today's ever changing threat landscape.
The Case for GRC: Addressing the Top 10 GRC Challenges by RSA, The Security Division of EMC. December 31, 2012 - This white paper shares the top 10 governance, risk, and compliance (GRC) challenges, and offers industry-leading advice on how to make the best investments in each of these areas.
The Case for Risk-Based, Business-Aligned Internal Audit by RSA, The Security Division of EMC. December 01, 2010 - The world we operate in as business professionals is rapidly changing. Organizations are faced with the increasing complexities of global operations, the growing morass of regulatory demands, pressures to decrease cost and increase efficiency, and the prospect of dealing with a set of new and potentially catastrophic risks.
The Critical Incident Response Maturity Journey by RSA, The Security Division of EMC. December 31, 2013 - This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
The Evolution of Information Security Management: 4-Phased Maturity Model by RSA, The Security Division of EMC. March 27, 2012 - Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.
The Forrester Wave™: Risk-Based Authentication, Q1 2012 by RSA, The Security Division of EMC. February 22, 2012 - This white paper reviews the top six risk-based authentication (RBA) vendors in the market today. Discover the pros and cons of each and how they stack up to one another. Review evaluations of each based on 16 key criteria, including customer satisfaction, mobile strategy, product revenue, and much more.
The Role of Governance, Risk Management & Compliance in Organizations by RSA, The Security Division of EMC. May 02, 2011 - Meeting enterprise Governance, Risk and Compliance (eGRC) objective is very challenging in today’s IT world. This white paper outlines the results of a study that surveyed 190 individuals from one of the largest eGRC practitioner communities.
The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business by RSA, The Security Division of EMC. March 18, 2009 - This white paper provides an overview of the Authentication Decision Tree; examines the five factors critical to selecting an authentication solution; and offers a clear guide to selecting the right solution that effectively balances risk, cost and end user convenience.
Thor Technologies, Inc.: Xellerate®, Secure Enterprise Provisioning System Integrates with RSA ClearTrust® to Provide Enhanced User Management by RSA, The Security Division of EMC. June 07, 2004 - Xellerate®, combined with RSA ClearTrust® software, provides a comprehensive solution that delivers centralized authentication and secure access management as well as user self-service and workflow capabilities.
Top 3 Tips to Securing Your Portal - And Protecting Your Customer by RSA, The Security Division of EMC. February 2008 - Enterprises are striving to accelerate their businesses by sharing core business data across all channels. Learn how you can strengthen your organization's portal(s), improve customer security and inspire customer confidence.
Transforming Information Security: Designing State-of-the-Art Extended Team by RSA, The Security Division of EMC. December 31, 2013 - This informative whitepaper explores strategies for designing a state-of-the-art security team.
Transforming Information Security: Focusing on Strategic Technologies by RSA, The Security Division of EMC. May 29, 2014 - This in-depth guide outlines the current threat landscape and explores strategic technologies for your information security strategy.
Transforming Information Security: Future-Proofing Processes by RSA, The Security Division of EMC. December 31, 2013 - Adapting your security strategy to today's expanding threat landscape can be a daunting task. This guide explores strategies for enhancing your security strategy and how to adapt to the current threat landscape.
UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk by RSA, The Security Division of EMC. March 27, 2012 - Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more.
Using a Risk-Based Approach to Address a Changing Threat Landscape by RSA, The Security Division of EMC. January 31, 2013 - In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.
Why Passwords Aren't Strong Enough: Making the Case for Strong Authentication by RSA, The Security Division of EMC. February 10, 2012 - With today’s advanced threat landscape and the increased value placed on information, relying on static passwords is no longer enough. This resource explores the need to strong authentication and the ROI benefits you can gain.
Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication by RSA, The Security Division of EMC. August 30, 2010 - In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.