RSA, The Security Division of EMC Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
RSA, The Security Division of EMC

Overview: RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by RSA, The Security Division of EMC.
Research offered by RSA, The Security Division of EMC

2013 RSA Archer GRC Summit: Key Findings by RSA, The Security Division of EMC. September 30, 2013 - View this white paper for the top findings from last year's  governance, risk, and compliance (GRC) forum to learn what latest trends you should consider for your strategy.

  View 2013 RSA Archer GRC Summit: Key Findings research abstract

6 Best Practices for Preventing Enterprise Data Loss by RSA, The Security Division of EMC. February 05, 2009 - Nearly 220 million electronic records have been breached since January 2005, according to Privacy Rights Clearinghouse. This paper outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements.

  View 6 Best Practices for Preventing Enterprise Data Loss research abstract

A Comprehensive Introduction to RSA SecurID User Authentication by RSA, The Security Division of EMC. November 01, 2006 - This white paper examines a two-factor authentication solution that helps efficiently manage the authentication of your company's users who access your network and web-based applications.

  View A Comprehensive Introduction to RSA SecurID User Authentication research abstract

A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository by RSA, The Security Division of EMC. February 19, 2009 - Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends.

  View A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository research abstract

A Prudent Approach to Risk Management by RSA, The Security Division of EMC. February 01, 2011 - Today's organizations are in need of more comprehensive and continuous risk management programs. Unfortunately, many do not have the appropriate processes, skills or technology foundation to meet this goal. Access this resource to uncover a prudent approach that uses three simple steps to help advance your risk management cause.

  View A Prudent Approach to Risk Management research abstract

Advanced Threats: The New World Order by RSA, The Security Division of EMC. October 25, 2011 - This paper examines the state of advanced threats on the front lines, as seen by the companies, law enforcement officials and government leaders. View now to gain a better understanding of these emerging threats, its challenges to all organizations and how to defend against them.

  View Advanced Threats: The New World Order research abstract

Akershus University Hospital: Safeguarding patient privacy with security information and event management by RSA, The Security Division of EMC. May 17, 2009 - Since 1995, a series of new European regulations have been introduced to protect the security and privacy of personal data held by corporations and public bodies, particularly concerning the logging of access to sensitive information. Read this case study to learn how RSA keeps Akerus University Hospital secure and compliant.

  View Akershus University Hospital: Safeguarding patient privacy with security information and event management research abstract

An Overview and Competitive Analysis of the One-Time Password (OTP) Market by RSA, The Security Division of EMC. October 14, 2010 - The landscape of the OTP market is changing as more organizations are searching for convenient solutions such as mobile authenticators. Growth in the market will center on providing these types of alternative mobile solutions for end-users. Read this paper to find out so much more.

  View An Overview and Competitive Analysis of the One-Time Password (OTP) Market research abstract

Authentication Management: Ensuring Security for Remote Workers by RSA, The Security Division of EMC. December 31, 2013 - This guide explores one company's authorization management tool and how it can enable secure access to employees working from home or other off-site locations.

  View Authentication Management: Ensuring Security for Remote Workers research abstract

Beating the Bad Guys: Strategies to Mitigate the Malware Threat by RSA, The Security Division of EMC. November 23, 2011 - While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.

  View Beating the Bad Guys: Strategies to Mitigate the Malware Threat research abstract

Breaking Through The Value Ceiling by RSA, The Security Division of EMC. December 05, 2013 - In this white paper, gain information to determine whether your governance, risk and compliance (GRC) tools have yet to maximize their full value, and discover 3 ways that you can go beyond to bring significant ROI.

  View Breaking Through The Value Ceiling research abstract

Build a Solid Foundation for Secure Virtualization by RSA, The Security Division of EMC. December 30, 2010 - Many companies are now virtualizing their data centers. Some have virtualized between thirty and fifty percent of their systems. As this virtualization process reaches critical business applications, it’s important to pause for a moment and consider security. How will virtualization impact security?

  View Build a Solid Foundation for Secure Virtualization research abstract

Building an Infrastructure That Enables Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - This paper takes the next logical step by guiding organizations in establishing the criteria for an infrastructure to help realize best practices and build a technology strategy for comprehensive security information and event management.

  View Building an Infrastructure That Enables Log Management Best Practices research abstract

Consumer Web Portals: Platforms At Significant Security Risk by RSA, The Security Division of EMC. December 31, 2013 - These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must.

  View Consumer Web Portals: Platforms At Significant Security Risk research abstract

Creating an Effective Security Operations Function by RSA, The Security Division of EMC. October 2008 - Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient.

  View Creating an Effective Security Operations Function research abstract

Cybercrime and the Healthcare Industry by RSA, The Security Division of EMC. June 21, 2011 - As technologies in healthcare continue to evolve, so will the cybercriminal activity targeted at healthcare organizations progress as well. This paper takes a look into cybercrime in the healthcare industry and discusses why access to data and information is fast becoming a target of scrutiny and risk.

  View Cybercrime and the Healthcare Industry research abstract

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. March 27, 2012 - This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy.

  View Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology research abstract

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. December 02, 2010 - As a result of the financial crisis beginning in 2008, companies are faced with an ongoing dilemma: reduce costs now while maintaining an appropriate risk management structure and preparing for the impending increase in regulatory demands.

  View Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology research abstract

End-to-end Solutions to Enable Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - This third paper in the series, describes end-to-end solutions that combine security information and event management (SIEM) and tiered storage technologies based on the RSA enVision platform and EMC networked storage solutions.

  View End-to-end Solutions to Enable Log Management Best Practices research abstract

Financial Institutions, Merchants, and the Race Against Cyberthreats by RSA, The Security Division of EMC. October 31, 2013 - In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.

  View Financial Institutions, Merchants, and the Race Against Cyberthreats research abstract

Financial Institutions: Managing Operational Risk with RSA® Archer® by RSA, The Security Division of EMC. November 30, 2013 - Access this white paper to discover a solution that today's financial institutions can use to balance risk quantity with management quality in order to ensure an efficient and effective program.

  View Financial Institutions: Managing Operational Risk with RSA® Archer® research abstract

Four Best Practices for Secure Web Access by RSA, The Security Division of EMC. June 01, 2009 - Read this white paper to learn best practices organizations can use to improve their ability to secure sensitive data and in turn, protect revenue, prevent the erosion of customer confidence and brand value, and meet the demands of regulatory compliance.

  View Four Best Practices for Secure Web Access research abstract

Gartner's Magic Quadrant for Security Information and Event Management 2008 by RSA, The Security Division of EMC. October 2008 - Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.

  View Gartner's Magic Quadrant for Security Information and Event Management 2008 research abstract

Getting Ahead of Advanced Threats - Achieving Intelligence-Driven Security by RSA, The Security Division of EMC. March 07, 2012 - With today’s advancing threat landscape, traditional approaches to information security are no longer enough. Instead organizations need to take an intelligence-driven approach to more effectively detect and mitigate cyber attacks. View now to explore the growing need for intelligence-driven security and uncover a 6-step approach for achieving it.

  View Getting Ahead of Advanced Threats - Achieving Intelligence-Driven Security research abstract

How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC. December 01, 2010 - Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.”

  View How to Get Started with Enterprise Risk Management research abstract

Impact Brief: Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC. August 31, 2010 - Faced with some of the greatest challenges in history, companies are focusing on cutting costs and more stringent fiscal management. Regardless of industry, organizations are reassessing investment budgets, reducing staff and implementing other measures to reduce operational expenses across all business disciplines.

  View Impact Brief: Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology research abstract

Impact Brief: How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC. July 28, 2010 - To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.

  View Impact Brief: How to Get Started with Enterprise Risk Management research abstract

Log Management Best Practices by RSA, The Security Division of EMC. February 15, 2008 - Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...

  View Log Management Best Practices research abstract

Log Management E-book by RSA, The Security Division of EMC. June 24, 2009 - Log management is covering several important aspects of network security. The four major chapters of this E-book focus on the use of log management as it pertains to compliance, analysis, forensics, and an SIEM alternative. Read on to learn more.

  View Log Management E-book research abstract

Making the FACTA Red Flags Rules Operational by RSA, The Security Division of EMC. October 2008 - Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.

  View Making the FACTA Red Flags Rules Operational research abstract

Next Generation Authentication for the Mobile Ready Enterprise by RSA, The Security Division of EMC. April 16, 2014 - This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.

  View Next Generation Authentication for the Mobile Ready Enterprise research abstract

Ovum: Corporate eGRC update by RSA, The Security Division of EMC. December 01, 2010 - This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future.

  View Ovum: Corporate eGRC update research abstract

Presentation Transcript: Authentication: Addressing the new Cloud, Mobile and Advanced Threats Environment by RSA, The Security Division of EMC. July 25, 2012 - Today's evolving IT environment and trends are providing vast opportunities for organizations – and a new array of security challenges. This webcast examines the emerging technologies and trends and explores 4 distinctive strong authentication technologies to help protect against the changing threat landscape.

  View Presentation Transcript: Authentication: Addressing the new Cloud, Mobile and Advanced Threats Environment research abstract

Protecting CPNI - Top Four Tips for a Successful Security Program Deployment by RSA, The Security Division of EMC. December 2008 - With the RSA CPNI Solution, telecommunications service providers can rest assured that they will not suffer financial or brand repercussions as a result of unauthorized disclosure of CPNI.

  View Protecting CPNI - Top Four Tips for a Successful Security Program Deployment research abstract

Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC. June 01, 2009 - This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization.

  View Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI research abstract

RSA Data Loss Prevention Suite: Uncover Your Risk, Establish Control by RSA, The Security Division of EMC. February 05, 2009 - Check out this white paper to learn how RSA Data Loss Prevention mitigates risks to sensitive data, achieves scalability, and lowers total cost of ownership.

  View RSA Data Loss Prevention Suite: Uncover Your Risk, Establish Control research abstract

RSA SecurID Authenticators by RSA, The Security Division of EMC. November 27, 2006 - Download this white paper and learn about a two-factor authentication solution that is easy to implement, cost-effective and helps secure internal and remote network access for your company.

  View RSA SecurID Authenticators research abstract

RSA Security Information and Event Management (SIEM) Deployment Guide by RSA, The Security Division of EMC. December 10, 2010 - The Cisco Smart Business Architecture for Enterprise offers partners and customers valuable network design and deployment best practices; helping organizations deliver superior end-user experiences that include switching, routing, security, and wireless technologies combined with the comprehensive management capabilities for the entire system.

  View RSA Security Information and Event Management (SIEM) Deployment Guide research abstract

RSA Solution for Cloud Security and Compliance by RSA, The Security Division of EMC. December 23, 2010 - This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.

  View RSA Solution for Cloud Security and Compliance research abstract

RSA Web Threat Detection - Innovative and Effective Online Threat Detection by RSA, The Security Division of EMC. January 31, 2014 - This white paper features a Web threat detection solution that uses business intelligence to better pinpoint and predict the anomalies, improving investigation and analysis of malicious behavior.

  View RSA Web Threat Detection - Innovative and Effective Online Threat Detection research abstract

Secure Remote Access by RSA, The Security Division of EMC. September 26, 2007 - This product brochure discusses how RSA's Secure Remote Access solution allows organizations to strongly authenticate and positively establish users' identities before granting access to the resources they need to work, regardless of their ...

  View Secure Remote Access research abstract

Securing the Administration of Virtualization by RSA, The Security Division of EMC. March 10, 2010 - In this report, Enterprise Management Associates (EMA) describes a systematic approach to securing the administration of virtualized systems, based on the ISO 27000-series “Plan – Do – Check – Act” philosophy. Read on to gain an enhanced awareness of the essential capabilities required for the secure administration of virtualization.

  View Securing the Administration of Virtualization research abstract

SIEM and DLP Together: A More Intelligent Information Risk Management Strategy by RSA, The Security Division of EMC. December 17, 2009 - This paper explores examples of how DLP and SIEM together can make for more intelligent information risk management.

  View SIEM and DLP Together: A More Intelligent Information Risk Management Strategy research abstract

Six Best Practices to Prevent Enterprise Data Loss by RSA, The Security Division of EMC. February 05, 2009 - Join Tom Corn, Vice President of Data Security Products at RSA, The Security Division of EMC as he discusses six best practices for preventing enterprise data loss. Hear how these best practices enable you to protect your critical data throughout its lifecycle -- no matter where it moves, who accesses it or how it is used.

  View Six Best Practices to Prevent Enterprise Data Loss research abstract

Sunbelt Exchange Archiver (SEA): Your Email Archiving Solution by RSA, The Security Division of EMC. August 2008 - SEA is a comprehensive email archiving solution from Sunbelt Software that effectively addresses today's corporate email communication needs.

  View Sunbelt Exchange Archiver (SEA): Your Email Archiving Solution research abstract

Taking Charge of Security in a Hyperconnected World by RSA, The Security Division of EMC. October 31, 2013 - Access this resource to uncover the top mistakes IT managers are making in their security strategies, and why they need a more continuous approach to improving defense systems in today's ever changing threat landscape.

  View Taking Charge of Security in a Hyperconnected World research abstract

The Case for GRC: Addressing the Top 10 GRC Challenges by RSA, The Security Division of EMC. December 31, 2012 - This white paper shares the top 10 governance, risk, and compliance (GRC) challenges, and offer industry-leading advice on how to best leverage this investment.

  View The Case for GRC: Addressing the Top 10 GRC Challenges research abstract

The Case for Risk-Based, Business-Aligned Internal Audit by RSA, The Security Division of EMC. December 01, 2010 - The world we operate in as business professionals is rapidly changing. Organizations are faced with the increasing complexities of global operations, the growing morass of regulatory demands, pressures to decrease cost and increase efficiency, and the prospect of dealing with a set of new and potentially catastrophic risks.

  View The Case for Risk-Based, Business-Aligned Internal Audit research abstract

The Critical Incident Response Maturity Journey by RSA, The Security Division of EMC. December 31, 2013 - This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.

  View The Critical Incident Response Maturity Journey research abstract

The Evolution of Information Security Management: 4-Phased Maturity Model by RSA, The Security Division of EMC. March 27, 2012 - Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.

  View The Evolution of Information Security Management: 4-Phased Maturity Model research abstract

The Forrester Wave™: Risk-Based Authentication, Q1 2012 by RSA, The Security Division of EMC. February 22, 2012 - This white paper reviews the top six risk-based authentication (RBA) vendors in the market today. Discover the pros and cons of each and how they stack up to one another. Review evaluations of each based on 16 key criteria, including customer satisfaction, mobile strategy, product revenue, and much more.

  View The Forrester Wave™: Risk-Based Authentication, Q1 2012 research abstract

The Role of Governance, Risk Management & Compliance in Organizations by RSA, The Security Division of EMC. May 02, 2011 - Meeting enterprise Governance, Risk and Compliance (eGRC) objective is very challenging in today’s IT world. This white paper outlines the results of a study that surveyed 190 individuals from one of the largest eGRC practitioner communities.

  View The Role of Governance, Risk Management & Compliance in Organizations research abstract

The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business by RSA, The Security Division of EMC. March 18, 2009 - This white paper provides an overview of the Authentication Decision Tree; examines the five factors critical to selecting an authentication solution; and offers a clear guide to selecting the right solution that effectively balances risk, cost and end user convenience.

  View The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business research abstract

The RSA GRC Reference Architecture by RSA, The Security Division of EMC. June 30, 2013 - With businesses continue to focus on governance, risk and compliance (GRC), IT professionals have to maintain efficient security policies. This in-depth white paper outlines the importance of a GRC policy and how it can help your business.

  View The RSA GRC Reference Architecture research abstract

The Total Economic Impact Of Silver Tail Systems by RSA, The Security Division of EMC. August 31, 2012 - In this in-depth white paper, Forrester Consulting examines the total economic impact that enterprises may realize by deploying Silver Tail Systems Forensics software.

  View The Total Economic Impact Of Silver Tail Systems research abstract

Thor Technologies, Inc.: Xellerate®, Secure Enterprise Provisioning System Integrates with RSA ClearTrust® to Provide Enhanced User Management by RSA, The Security Division of EMC. June 07, 2004 - Xellerate®, combined with RSA ClearTrust® software, provides a comprehensive solution that delivers centralized authentication and secure access management as well as user self-service and workflow capabilities.

  View Thor Technologies, Inc.: Xellerate®, Secure Enterprise Provisioning System Integrates with RSA ClearTrust® to Provide Enhanced User Management research abstract

Top 3 Tips to Securing Your Portal - And Protecting Your Customer by RSA, The Security Division of EMC. February 2008 - Enterprises are striving to accelerate their businesses by sharing core business data across all channels. Learn how you can strengthen your organization's portal(s), improve customer security and inspire customer confidence.

  View Top 3 Tips to Securing Your Portal - And Protecting Your Customer research abstract

UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk by RSA, The Security Division of EMC. March 27, 2012 - Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more.

  View UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk research abstract

Using a Risk-Based Approach to Address a Changing Threat Landscape by RSA, The Security Division of EMC. January 31, 2013 - In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.

  View Using a Risk-Based Approach to Address a Changing Threat Landscape research abstract

Why Passwords Aren't Strong Enough by RSA, The Security Division of EMC. January 31, 2011 - In this white paper, uncover the urgent need for strong authentication, and how investing in one-time password technology will not only keep your assets protect, but also deliver high ROI in the long-run.

  View Why Passwords Aren't Strong Enough research abstract

Why Passwords Aren't Strong Enough: Making the Case for Strong Authentication by RSA, The Security Division of EMC. February 10, 2012 - With today’s advanced threat landscape and the increased value placed on information, relying on static passwords is no longer enough. This resource explores the need to strong authentication and the ROI benefits you can gain.

  View Why Passwords Aren't Strong Enough: Making the Case for Strong Authentication research abstract

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication by RSA, The Security Division of EMC. August 30, 2010 - In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.

  View Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication research abstract

You Are the Target - But You Don't Have To Be with Effective Authentication by RSA, The Security Division of EMC. August 31, 2013 - In this analyst report by Frost & Sullivan, uncover 5 case studies on organizations of all sizes that found passwords to be subpar in security measures. Learn how they benefited from a multi-factor authentication platform, which ensured that only authorized users could access their private, dynamic networks.

  View You Are the Target - But You Don't Have To Be with Effective Authentication research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts