SECURING IDENTITY: THE CHALLENGE TO ABOUT THE RSA …€¦ · ABOUT THE RSA SECURID SUITE: IDENTITY...
Transcript of SECURING IDENTITY: THE CHALLENGE TO ABOUT THE RSA …€¦ · ABOUT THE RSA SECURID SUITE: IDENTITY...
ABOUT THE RSA SECURID SUITE: IDENTITY ACCESS MANAGEMENT (IAM) EVOLVED
SECURING IDENTITY: THE CHALLENGE TO THE ENTERPRISE With the rise of SaaS applications and personal devices in the workplace, the formerly fixed perimeter of the enterprise has become disrupted. For every benefit that has emerged from increased connectivity, new vulnerabilities arise.
Consider: • The enterprise landscape now extends across on-
premises, mobile, Public and Private Clouds
• The need to allow access to corporate applications anddata is ever increasing
• Unauthorised use of applications, or Shadow IT, hasbecome more common
• These conditions have created ‘Islands of Identity’,resulting in security fragmentation
• Black hat hackers ceaselessly seek every possibleexploit to disrupt vital systems and steal valuable data orassets.
Unfortunately, the very same people at the heart of businesses have themselves become unwitting vectors of attack, with 63% of all confirmed data breaches involving weak, default, or stolen passwords. 1
The need for an all-encompassing solution for the enterprise to address these multiple identity-based vulnerabilities – without negatively impacting the user experience – has never been greater.
1 Verizon Data Breach Investigations Report 2016
In response to these challenges, RSA have created the RSA SecurID Suite. By unifying multi-factor Single Sign-on (SSO) authentication with intelligent analytics and policy management, it is the one solution that can provide a common authentication and access control solution for all enterprise resources – wherever they live.
1. RSA SecurID AccessStrong, secure access and SSO to all applications and platforms, including Web and SaaS apps, native mobile apps and legacy resources(including VPNs, firewalls, virtual desktopsand Windows or Linux servers). A choice of authenticators – hardware or software tokens, wearables, biometrics, and more – for the ultimate balance of security and convenience. With over 400+ integrations with traditional applications and a frictionless user experience, all passwords are stored safely on-premises – never in the Cloud.
2. RSA Identity GovernanceSimplify the governance of user access across the enterprise, and enhance compliance through automated monitoring, certification, and remediation of user entitlements. RSA Governance grants enterprise-wide visibility into all user access privileges.
3. RSA Identity LifecycleAutomate provisioning and access requests, approval and delivery for streamlined onboarding and transfers, enabling quick connection across all key applications – SaaS or on-premises. Enterprises can leverage their existing provisioning systems – no need to rip and replace.
RSA SecurID Suite is composed of:
“With identity a sustaining element of digital business, IAM is a critical obligation for business leaders, security and risk professionals, and IT staff. With the advent of digital business, it becomes even more important that IAM initiatives across the organization be united within a single program.”
- Gartner, Market Guide for User Authentication, February 2016
IDENTITY & ACCESS
MONITORING & ANALYTICS
GOVERNANCE, RISK &
COMPLIANCE
MANAGEINVESTIGATION
AUTHENTICATION
LAUNCH
INVESTIGATIONCLOUD RESOURCES
ACCOUNT PROVISIONING
SINGLE SIGN-ON
ACCOUNT PROVISIONING
SINGLE SIGN-ON
ON-PREMISE
RESOURCES
STEP-UP
AUTHENTICATION
STEP-UP
AUTHENTICATION
ID
PASS******
REAL-TIMEMONITORING
DATA
SALESD8
CUSTOMERD8
SEARCH: “TRANSACTION”
SEARCH: “CUSTOMER”
HR DATA
EMPLOYEE INTERNET
ALERT! HACKERTOOL ACTIVITY!
ALERT! FAILED ATTEMPT TO ACCESSCONFIDENTIAL INFORMATION!
ALERT! ACTIVITY FROM KNOWN-BAD IP ADDRESS!
SEVERITY: 1!
ANALYTICS
DATA
DATA
ACCESS WITH STOLEN CREDENTIALS
!
!!
!
INCIDENTREMEDIATEDTHREAT STOPPED
DEFINE CRITICAL ASSETS
CRITICAL CONFIDENTIAL ASSET: FINANCIAL RECORDS
$
WORKFLOW
CRITICAL ASSET:PERSONAL INFORMATION
DEFINE CRITICAL ASSETS
RSA SecurID Suite is composed of:
For more information on RSA SecurID Access and RSA SecurID Suite, or to sign up for a free 90-day trial, contact a Data#3 Security Expert.
*data3.com.au/data3-secure/RSA1300 232 823
ALREADY AN RSA SECURID CUSTOMER? UPGRADE TO RSA SECURID ACCESSAvailable as part of the RSA SecurID Suite or as a stand-alone deployment, RSA SecurID Access is the next evolution of the trusted RSA SecurID authentication platform. Here are just some of the ways it is helping enterprises today:
• Extending existing SecurID deployments to the Cloud – strongauthentication for Office 365, Salesforce, and practically anySAML-compliant application
• Securing virtual desktop architecture – coverage for VMware,Citrix, Microsoft and many others
• Defending access to web portals with ‘tokenless’ risk-basedauthentication – protecting HR and internal applications
• Protecting user access to web applications
• Protecting on-premises thick-client applications such as WindowsDesktop, Windows Domain Controllers, Linux Servers, and IPSecVPNs
Available separately in Base, Enterprise, and Premium configurations.
Take command of the entire Identity Lifecycle, with the RSA SecurID Suite.
EXPERIENCE COMPLETE IDENTITY AND ACCESS ASSURANCE FOR YOURSELF
Flexible enough to meet whatever requirements you need, RSA SecurID Suite lets you securely embrace the Cloud while maintaining your on-premises investments. It is the one authentication and access control solution that can bridge the ‘Islands of Identity’ created by the diverse systems of your enterprise infrastructure.
Multi-factor SSO authentication
Orchestration and onboarding
Automated access approvals
Intelligent analytics
Policy management Regulatory and organisational compliance