Overview: RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by RSA, The Security Division of EMC.
Research offered by RSA, The Security Division of EMC
6 Best Practices for Preventing Enterprise Data Loss by RSA, The Security Division of EMC. February 05, 2009 - Nearly 220 million electronic records have been breached since January 2005, according to Privacy Rights Clearinghouse. This paper outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements.
The Evolution of Information Security Management: 4-Phased Maturity Model by RSA, The Security Division of EMC. March 27, 2012 - Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.
A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by RSA, The Security Division of EMC. February 19, 2009 - Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends.
A Prudent Approach to Risk Management by RSA, The Security Division of EMC. February 01, 2011 - Today's organizations are in need of more comprehensive and continuous risk management programs. Unfortunately, many do not have the appropriate processes, skills or technology foundation to meet this goal. Access this resource to uncover a prudent approach that uses three simple steps to help advance your risk management cause.
Advanced Threats: The New World Order by RSA, The Security Division of EMC. October 25, 2011 - This paper examines the state of advanced threats on the front lines, as seen by the companies, law enforcement officials and government leaders. View now to gain a better understanding of these emerging threats, its challenges to all organizations and how to defend against them.
Akershus University Hospital: Safeguarding patient privacy with security information and event management by RSA, The Security Division of EMC. May 17, 2009 - Since 1995, a series of new European regulations have been introduced to protect the security and privacy of personal data held by corporations and public bodies, particularly concerning the logging of access to sensitive information. Read this case study to learn how RSA keeps Akerus University Hospital secure and compliant.
An Overview and Competitive Analysis of the One-Time Password (OTP) Market by RSA, The Security Division of EMC. October 14, 2010 - The landscape of the OTP market is changing as more organizations are searching for convenient solutions such as mobile authenticators. Growth in the market will center on providing these types of alternative mobile solutions for end-users. Read this paper to find out so much more.
Beating the Bad Guys: Strategies to Mitigate the Malware Threat by RSA, The Security Division of EMC. November 23, 2011 - While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Build a Solid Foundation for Secure Virtualization by RSA, The Security Division of EMC. December 30, 2010 - Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security?
Building an Infrastructure That Enables Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - This paper takes the next logical step by guiding organizations in establishing the criteria for an infrastructure to help realize best practices and build a technology strategy for comprehensive security information and event management.
Creating an Effective Security Operations Function by RSA, The Security Division of EMC. October 2008 - Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient.
Cybercrime and the Healthcare Industry by RSA, The Security Division of EMC. June 21, 2011 - As technologies in healthcare continue to evolve, so will the cybercriminal activity targeted at healthcare organizations progress as well. This paper takes a look into cybercrime in the healthcare industry and discusses why access to data and information is fast becoming a target of scrutiny and risk.
Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. March 27, 2012 - This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy.
Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. December 02, 2010 - As a result of the financial crisis beginning in 2008, companies are faced with an ongoing dilemma: reduce costs now while maintaining an appropriate risk management structure and preparing for the impending increase in regulatory demands.
End-to-end Solutions to Enable Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - This third paper in the series, describes end-to-end solutions that combine security information and event management (SIEM) and tiered storage technologies based on the RSA enVision platform and EMC networked storage solutions.
Four Best Practices for Secure Web Access by RSA, The Security Division of EMC. June 01, 2009 - Read this white paper to learn best practices organizations can use to improve their ability to secure sensitive data and in turn, protect revenue, prevent the erosion of customer confidence and brand value, and meet the demands of regulatory compliance.
Gartner's Magic Quadrant for Security Information and Event Management 2008 by RSA, The Security Division of EMC. October 2008 - Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Getting Ahead of Advanced Threats - Achieving Intelligence-Driven Security by RSA, The Security Division of EMC. March 07, 2012 - With today’s advancing threat landscape, traditional approaches to information security are no longer enough. Instead organizations need to take an intelligence-driven approach to more effectively detect and mitigate cyber attacks. View now to explore the growing need for intelligence-driven security and uncover a 6-step approach for achieving it.
How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC. December 01, 2010 - Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.”
Impact Brief: Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. August 31, 2010 - Faced with some of the greatest challenges in history, companies are focusing on cutting costs and more stringent fiscal management. Regardless of industry, organizations are reassessing investment budgets, reducing staff and implementing other measures to reduce operational expenses across all business disciplines.
Impact Brief: How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC. July 28, 2010 - To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.
Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Log Management E-book by RSA, The Security Division of EMC. June 24, 2009 - Log management is covering several important aspects of network security. The four major chapters of this E-book focus on the use of log management as it pertains to compliance, analysis, forensics, and an SIEM alternative. Read on to learn more.
Making the FACTA Red Flags Rules Operational by RSA, The Security Division of EMC. October 2008 - Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Ovum: Corporate eGRC update by RSA, The Security Division of EMC. December 01, 2010 - This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future.
Presentation Transcript: Authentication: Addressing the new Cloud, Mobile and Advanced Threats Environment by RSA, The Security Division of EMC. July 25, 2012 - Today's evolving IT environment and trends are providing vast opportunities for organizations – and a new array of security challenges. This webcast examines the emerging technologies and trends and explores 4 distinctive strong authentication technologies to help protect against the changing threat landscape.
Protecting CPNI - Top Four Tips for a Successful Security Program Deployment by RSA, The Security Division of EMC. December 2008 - With the RSA CPNI Solution, telecommunications service providers can rest assured that they will not suffer financial or brand repercussions as a result of unauthorized disclosure of CPNI.
Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC. June 01, 2009 - This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization.
RSA Data Loss Prevention Suite: Uncover Your Risk, Establish Control by RSA, The Security Division of EMC. February 05, 2009 - Check out this white paper to learn how RSA Data Loss Prevention mitigates risks to sensitive data, achieves scalability, and lowers total cost of ownership.
RSA Security Information and Event Management (SIEM) Deployment Guide by RSA, The Security Division of EMC. December 10, 2010 - The Cisco Smart Business Architecture for Enterprise offers partners and customers valuable network design and deployment best practices; helping organizations deliver superior end-user experiences that include switching, routing, security, and wireless technologies combined with the comprehensive management capabilities for the entire system.
RSA Solution for Cloud Security and Compliance by RSA, The Security Division of EMC. December 23, 2010 - This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.
Securing the Administration of Virtualization by RSA, The Security Division of EMC. March 10, 2010 - In this report, Enterprise Management Associates (EMA) describes a systematic approach to securing the administration of virtualized systems, based on the ISO 27000-series “Plan – Do – Check – Act” philosophy. Read on to gain an enhanced awareness of the essential capabilities required for the secure administration of virtualization.
SIEM and DLP Together: A More Intelligent Information Risk Management Strategy by RSA, The Security Division of EMC. December 17, 2009 - This paper explores examples of how DLP and SIEM together can make for more intelligent information risk management.
Six Best Practices to Prevent Enterprise Data Loss by RSA, The Security Division of EMC. February 05, 2009 - Join Tom Corn, Vice President of Data Security Products at RSA, The Security Division of EMC as he discusses six best practices for preventing enterprise data loss. Hear how these best practices enable you to protect your critical data throughout its lifecycle -- no matter where it moves, who accesses it or how it is used.
The Case for Risk-Based, Business-Aligned Internal Audit by RSA, The Security Division of EMC. December 01, 2010 - The world we operate in as business professionals is rapidly changing. Organizations are faced with the increasing complexities of global operations, the growing morass of regulatory demands, pressures to decrease cost and increase efficiency, and the prospect of dealing with a set of new and potentially catastrophic risks.
The Forrester Wave™: Risk-Based Authentication, Q1 2012 by RSA, The Security Division of EMC. February 22, 2012 - This white paper reviews the top six risk-based authentication (RBA) vendors in the market today. Discover the pros and cons of each and how they stack up to one another. Review evaluations of each based on 16 key criteria, including customer satisfaction, mobile strategy, product revenue, and much more.
The Role of Governance, Risk Management & Compliance in Organizations by RSA, The Security Division of EMC. May 02, 2011 - Meeting enterprise Governance, Risk and Compliance (eGRC) objective is very challenging in today’s IT world. This white paper outlines the results of a study that surveyed 190 individuals from one of the largest eGRC practitioner communities.
The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business by RSA, The Security Division of EMC. March 18, 2009 - This white paper provides an overview of the Authentication Decision Tree; examines the five factors critical to selecting an authentication solution; and offers a clear guide to selecting the right solution that effectively balances risk, cost and end user convenience.
Top 3 Tips to Securing Your Portal - And Protecting Your Customer by RSA, The Security Division of EMC. February 2008 - Enterprises are striving to accelerate their businesses by sharing core business data across all channels. Learn how you can strengthen your organization's portal(s), improve customer security and inspire customer confidence.
UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk by RSA, The Security Division of EMC. March 27, 2012 - Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more.
Why Passwords Aren't Strong Enough: Making the Case for Strong Authentication by RSA, The Security Division of EMC. February 10, 2012 - With today’s advanced threat landscape and the increased value placed on information, relying on static passwords is no longer enough. This resource explores the need to strong authentication and the ROI benefits you can gain.
Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication by RSA, The Security Division of EMC. August 30, 2010 - In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.