RSA Security

Displaying 1-40 of 90 results

  • White Papers // Oct 2012

    Defending Against the Unknown Enemy: Applying FLIPIT to System Security

    Most cryptographic systems carry the basic assumption that entities are able to preserve the secrecy of their keys. With attacks today showing ever increasing sophistication, however, this tenet is eroding. "Advanced Persistent Threats" (APTs), for instance, leverage zero-day exploits and extensive system knowledge to achieve full compromise of cryptographic keys...

    Provided By RSA Security

  • White Papers // Feb 2010

    6 Best Practices for Preventing Enterprise Data Loss.

    Enterprise data loss' cost businesses nearly $105 billion last year. So, how can companies protect themselves from a data loss catastrophe? This paper from RSA outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements.

    Provided By RSA Security

  • White Papers // Feb 2010

    The RSA Authentication Decision Tree:Selecting the Best Authentication Solution for Your Business.

    "What is the best authentication solution for my business?" Before making a final selection, organizations must consider their user authentication needs, the threats, and their business objectives. This free RSA whitepaper looks at the Authentication Decision Tree - a tool to help organizations understand, evaluate and select the most appropriate...

    Provided By RSA Security

  • White Papers // Feb 2010

    Assuring User Identities During a Business Disruption.

    This RSA white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency - without lowering the security policy,...

    Provided By RSA Security

  • Case Studies // Sep 2009

    RSA Security Solutions Speed Up Business for Liquigas

    Liquigas Distribuidora S/A is a private limited company founded in 1953 and operating across Brazil. The challenge was to improve security infrastructure to protect confidential corporate data from unauthorized access and to accelerate the business process and maintain company's market leadership position with remote connection to company network. Liquigas deployed...

    Provided By RSA Security

  • Case Studies // Sep 2009

    RSA SecurID Aids Highly-Secure Remote Hard Drive Encryption

    This government department ensures that the correct tax is paid at the right time, whether this relates to payment of taxes received by the department or entitlement to benefits paid. The challenge was to further improve the security of sensitive data, including Personally Identifiable Information and to deploy government-approved hard...

    Provided By RSA Security

  • White Papers // Sep 2009

    Securing Sensitive Data With Tokenization: An Emerging Technology

    Tokenization is an emerging technology for protecting sensitive information, based on the well-established technique of substitution. It provides significant advantages compared to traditional encryption and other technologies such as format-preserving encryption. Tokenization can reduce the scope of threats to sensitive information and ease the burden of compliance management. It can...

    Provided By RSA Security

  • White Papers // Sep 2009

    Information Security and Privacy in Emerging Economies: Implications for Global Competitiveness

    Commerce, collaboration and communication have, throughout time, been enabled or hampered by the environment of trust, security and privacy in which they occur. In an increasingly fluid, interconnected global community, the ways in which creates trust, ensure privacy and provide security must evolve, and must take advantage of available best...

    Provided By RSA Security

  • Case Studies // Sep 2009

    Local Authority Meets GCSX CoCo Compliance Challenge With RSA enVision

    The City of Salford is a local government district of Greater Manchester, England, with the status of a city and metropolitan borough. The challenge was to enable employees to access the Government Connect Secure Extranet (GCSX), giving them direct, secure communication with other government bodies and to meet GCSX Code...

    Provided By RSA Security

  • Case Studies // Sep 2009

    Centralised Security Monitoring Helps the Andorran Telecoms Operator Deploy a Comprehensive Security Policy Centred on Prevention

    Created in 1975, Andorra Telecom is the sole operator and manager of telecommunications services in the Principality of Andorra. The challenge was to centralise security information which was managed by disparate IT operations departments and to automate incident management to prevent intrusions and sensitive information leaks. Andorra Telecom deployed RSA...

    Provided By RSA Security

  • White Papers // Sep 2009

    Security in the Call Center: Verifying Customer Identities Without the Inconvenience

    Off late many organizations looking to reduce costs, increase efficiency, and provide more self-service options for their customers have driven sales and service to the online channel. While the Internet offers many advantages, the live interaction offered through the Call Center is still a preferred method for many customers looking...

    Provided By RSA Security

  • White Papers // Sep 2009

    Business Success in a Dark Market: An Inside Look at How the Fraud Underground Operates

    The business of online fraud has developed into a sophisticated underground criminal operation that continues to evolve everyday. Much like a real-world business, fraud "Entrepreneurs" offer products and services for a profit, they fight to gain competitive advantage and market share, are continually innovating to improve their offerings and meet...

    Provided By RSA Security

  • Case Studies // Sep 2009

    Securing Online Banking on an Unprecedented Scale

    This large commercial bank in Asia serves over 12 million customers. The challenge was to offer compelling eBanking services with reliable security measures to protect transactions and reassure customers and to integrate new solution smoothly with bank's existing platform to minimize downtime and service disruption. Bank deployed RSA SecurID hardware...

    Provided By RSA Security

  • Case Studies // Sep 2009

    Enhancing Customer Confidence With a Strategic Approach to Data Protection

    Operating in 180 countries worldwide, this company is dedicated to changing millions of lives for the better through providing access to safe, effective and affordable medicines and related health care services. The challenge was to comply with industry requirements and customer expectations that sensitive data, from new drug trial details...

    Provided By RSA Security

  • Case Studies // Aug 2009

    RSA SecurID Ensures Strong Authentication for Secure Access to Criminal Justice Records

    The Kansas Bureau of Investigation (KBI) is the criminal investigative arm of the State of Kansas. It is responsible for providing investigative and laboratory services to criminal justice agencies as well as preventing crime in the State of Kansas. The challenge was to provide employees with real-time online access to...

    Provided By RSA Security

  • White Papers // Aug 2009

    Guidelines and Considerations for Securing Your Microsoft SharePoint Environment

    Microsoft SharePoint can be an extremely powerful tool for sharing and collaborating on information, providing a flexible, distributed approach to management and control. However, its very strengths can also lead to a wide range of security and compliance problems. By moving the responsibility for what gets stored in SharePoint and...

    Provided By RSA Security

  • White Papers // Aug 2009

    Security Compliance in a Virtual World: Best Practices to Build a Solid Foundation

    Over time, IT and security teams and external auditors will increase their knowledge and competencies in virtualization. IT and security teams should work closely with each other and their internal and external auditors in the design and implementation of virtual systems and educate them about the specific risk management methods...

    Provided By RSA Security

  • Case Studies // Aug 2009

    TELUS Improves Compliance and Strengthens Security With the RSA enVision Platform

    TELUS is a leading national telecommunications company in Canada, with $9.7 billion of annual revenue and 11.6 million customer connections including 6.1 million wireless subscribers, 4.2 million wireline network access lines and 1.2 million Internet subscribers. The challenge was to comply with Payment Card Industry (PCI) security standards regulation by...

    Provided By RSA Security

  • Case Studies // Aug 2009

    RSA SecurID Helps NTT Europe Online Meet PCI DSS Compliance

    NTT Europe Online (NTTEO) provides managed hosting, security and application management services to enterprises globally. NTTEO wanted to become fully Payment Card Industry Data Security Standard (PCI DSS) compliant in all areas of its business, from its datacentres through to HR procedures and to meet one of the 150 PCI...

    Provided By RSA Security

  • White Papers // Aug 2009

    Assuring User Identities During a Business Disruption: Applying a Consistent Strong Authentication Policy to Business Continuity Planning

    This white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency - without lowering the security policy, opening...

    Provided By RSA Security

  • Case Studies // Aug 2009

    Customer Assurance Leads to Plunging Costs and Climbing Profits

    The company is one of the largest financial organisations in Europe with 40 million customers, over 10,000 branches and an operating profit of over $5 billion ($7 bn). The challenge was that organization needed to guarantee customer confidence in order to ensure adoption of online banking services and failure to...

    Provided By RSA Security

  • Case Studies // Aug 2009

    Online Fraud Plummets as European Banking Group Partners With RSA

    As one of the leading retail banks in Europe, with a number of market leading positions, this banking organisation serves over 30 million people. The challenge was to european banking group that was faced with mounting fraud costs following the introduction of an e-commerce scheme, 3D Secure, which shifted liability...

    Provided By RSA Security

  • Case Studies // Aug 2009

    Improving Security and Compliance, While Reducing Cost and Complexity

    A specialist provider of transaction services, with an automated payment platform processing over 90 million transactions on a peak day and a switching platform connecting over 60,000 ATMs. The challenge was to improve the overall security and simplify support of the company's heterogeneous IT environment and to standardise and centralise...

    Provided By RSA Security

  • Case Studies // Aug 2009

    Extra Security Layer Gives Banca Popolare Di Sondrio (SUISSE) Competitive Edge

    Since its foundation in 1871, Banca Popolare di Sondrio has grown from being a small Italian bank to employing 2,300 people in 262 branches. The challenge was that it was keen to show customers that security measures were up-to-date, providing peace of mind that their savings and investments were safe...

    Provided By RSA Security

  • Case Studies // Jul 2009

    HypoVereinsbank Increases Security Standards Across Its Network

    With around 23,000 employees, 631 branches and more than four million customers, HypoVereinsbank (HVB) is one of Germany's largest banks. The challenge was to restructure internal network infrastructure in order to improve overall security and to increase the operational security of server and application systems by setting up an internal...

    Provided By RSA Security

  • White Papers // Jun 2009

    Five Key Considerations for Selecting a Data Loss Prevention Solution

    Data loss prevention is about more than just preventing sensitive data from being lost or mishandled. If that were the case, organizations would block every single transmission and prevent every sensitive file from being accessed or handled. If every file were blocked or encrypted, it would impede immensely on employee...

    Provided By RSA Security

  • White Papers // Jun 2009

    The Coming Storm of Regulation

    The continuing financial crisis that has gripped the world since mid-2008 is likely to cause a flood of new global regulations. The nature of this failure dictates a new approach to regulations that will drive transparency requirements and risk management adoption. Organizations throughout the world will need to effectively manage...

    Provided By RSA Security

  • Resource Center // Jun 2009

    Authentication Decision Tree Tool

    The RSA Authentication Decision Tree Tool is an interactive tool to help organizations understand, evaluate and select the most appropriate authentication solution to meet the needs of their users and their business. It provides a framework to help narrow the selection of authentication solutions based on five critical factors.

    Provided By RSA Security

  • White Papers // Jun 2009

    The RSA Authentication Decision Tree: Selecting the Best Authentication Method for Your Business White Paper

    The RSA Authentication Decision Tree: Selecting the Best Authentication Method for Your Business White Paper provides an overview of the RSA Authentication Decision Tree, examines the 5 factors critical to selecting an authentication solution, and offers a clear guide to selecting the right solution that effectively balances risk, cost and...

    Provided By RSA Security

  • White Papers // Jun 2009

    Securing Sensitive Information With Identity and Access Assurance

    Identity and Access Management (IAM) is a combination of business and Information Technology (IT) practices designed to ensure that only the right people have the right access to the right resources and are doing the right things. While different organizations may place varying emphasis on different business drivers for implementing...

    Provided By RSA Security

  • White Papers // May 2009

    ROI and SIEM: How the RSA enVision Platform Delivers an Industry-Leading ROI

    This paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. "SIEM ROI" depends on several factors, including a user's compliance and security obligations, the size and complexity of the IT environment and any current log management processes.

    Provided By RSA Security

  • White Papers // May 2009

    Information-Centric Security for the Virtual Data Center

    Marrying the flexibility and agility of virtualization with the needs of the contemporary enterprise for information security, privacy and compliance demands that more intelligence and decision-making around security be embedded in the infrastructure itself. RSA's risk-based approach helps customers ensure security and compliance without sacrificing the operational flexibility and mobility...

    Provided By RSA Security

  • White Papers // May 2009

    Four Best Practices for Secure Web Access

    Securing web access is critical to protect against the threat of sensitive corporate data ending up in the wrong hands. As organizations extend access to more users and enable information sharing across more applications and systems, a secure web access strategy is essential. By following these best practices, organizations can...

    Provided By RSA Security

  • Case Studies // May 2009

    Safeguarding Patient Privacy With Security Information and Event Management

    One of four hospitals affiliated with the University of Oslo, Akershus University Hospital (Ahus), is situated in the Lorenskog municipality in the south east of Norway. The challenge was to ensure all healthcare institutions in Norway comply with national and European data protection regulation and identify and implement scalable platform...

    Provided By RSA Security

  • White Papers // Apr 2009

    Securing Customer Proprietary Network Information: The Telecommunication Carriers' Challenge

    According to the United States Federal Communications Commission (FCC), major security breaches between February 2005 and April 2007 resulted in the Customer Proprietary Network Information (CPNI) of over 54 million Americans to be compromised, including consumer call detail information, billing and other personally identifiable information (PII). These breaches represent a...

    Provided By RSA Security

  • White Papers // Apr 2009

    Luxair enhances customer service and guarantees compliance with integrated log monitoring and real-time reporting

    Luxair is the national airline of the Grand Duchy of Luxembourg, with 19 regular European destinations. The company is part of LuxairGroup, a key player in the national and regional economies, which employs more than 2,300 people. The airline was created in 1948 and has been offering high quality services...

    Provided By RSA Security

  • White Papers // Apr 2009

    Log Management Best Practices The Foundation for Comprehensive Security Information and Event Management

    Log (event) management is the collection, analysis (real-time or historical), storage and management of logs from a range of sources across the enterprise. It is the foundation for comprehensive security information and event management (SIEM). Organizations which develop best practices in log management will get timely analysis of their security...

    Provided By RSA Security

  • White Papers // Apr 2009

    Driving Fast and Forward: Managing Information Security for Strategic Advantage in a Tough Economy

    Enterprises worldwide face escalating economic uncertainty; yet at the same time, the forces of globalization and technology continue to offer tremendous opportunities. Navigating the road ahead will be challenging. It will require that enterprises use not only the power of business innovation but also the ability to manage risk for...

    Provided By RSA Security

  • White Papers // Apr 2009

    Developing a Sustainable and Cost Effective IT Compliance Program

    Complying with laws and regulations is an increasing burden for organizations, from the board of directors down to the trenches of business. Over the past ten years there has been a significant and growing impact of regulatory compliance specifically on the IT department. In a nutshell: business is complex and...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA® Solutions for Securing Critical Cyber Assets within Electric Utilities

    Today, electric utilities are faced with the ever-growing threat of cyber intrusion which poses a huge risk to businesses and power customers. While hackers have targeted electric utilities and have been the cause of multiple power outages globally, the problem is one that poses a particular threat to US &...

    Provided By RSA Security

  • White Papers // Apr 2009

    Luxair enhances customer service and guarantees compliance with integrated log monitoring and real-time reporting

    Luxair is the national airline of the Grand Duchy of Luxembourg, with 19 regular European destinations. The company is part of LuxairGroup, a key player in the national and regional economies, which employs more than 2,300 people. The airline was created in 1948 and has been offering high quality services...

    Provided By RSA Security

  • White Papers // Apr 2009

    Log Management Best Practices The Foundation for Comprehensive Security Information and Event Management

    Log (event) management is the collection, analysis (real-time or historical), storage and management of logs from a range of sources across the enterprise. It is the foundation for comprehensive security information and event management (SIEM). Organizations which develop best practices in log management will get timely analysis of their security...

    Provided By RSA Security

  • White Papers // Apr 2009

    Driving Fast and Forward: Managing Information Security for Strategic Advantage in a Tough Economy

    Enterprises worldwide face escalating economic uncertainty; yet at the same time, the forces of globalization and technology continue to offer tremendous opportunities. Navigating the road ahead will be challenging. It will require that enterprises use not only the power of business innovation but also the ability to manage risk for...

    Provided By RSA Security

  • White Papers // Apr 2009

    Developing a Sustainable and Cost Effective IT Compliance Program

    Complying with laws and regulations is an increasing burden for organizations, from the board of directors down to the trenches of business. Over the past ten years there has been a significant and growing impact of regulatory compliance specifically on the IT department. In a nutshell: business is complex and...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA® Solutions for Securing Critical Cyber Assets within Electric Utilities

    Today, electric utilities are faced with the ever-growing threat of cyber intrusion which poses a huge risk to businesses and power customers. While hackers have targeted electric utilities and have been the cause of multiple power outages globally, the problem is one that poses a particular threat to US &...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA PCI Solutions for Retail

    Accelerating PCI Compliance and Your Business - Discover cardholder data - Assess areas of non-compliance and prioritize remediation activities - Encrypt cardholder data from point-of-sale applications onward and manage encryption keys - Authenticate users and authorize access to cardholder data and related systems - Manage logs and ease the process...

    Provided By RSA Security

  • White Papers // Apr 2009

    Securing Customer Proprietary Network Information: The Telecommunication Carriers' Challenge

    According to the United States Federal Communications Commission (FCC), major security breaches between February 2005 and April 2007 resulted in the Customer Proprietary Network Information (CPNI) of over 54 million Americans to be compromised, including consumer call detail information, billing and other personally identifiable information (PII). These breaches represent a...

    Provided By RSA Security

  • White Papers // Apr 2009

    6 Best Practices for PreventingEnterprise Data Loss

    The numbers are staggering. Nearly 220 million electronic records have been breached since January 2005, according to Privacy Rights Clearinghouse (www.privacyrights.org), a non- profit consumer information and advocacy organization. Not only is the number of data thefts and losses due to security breaches continuing to grow at an alarming rate,...

    Provided By RSA Security

  • White Papers // Sep 2008

    The Relationship Between ISO 27002 and the EU Data Protection Directive

    The regulatory landscape for Information Security in Europe has grown ever more complex in recent years. As organisations, both public and private, recognise the inherent value of their information, and as the safety and reliability of electronic communications become ever more central to the ways in which it interacts with...

    Provided By RSA Security

  • White Papers // Apr 2009

    6 Best Practices for Preventing Enterprise Data Loss

    Protecting a company from enterprise data loss is a strategic necessity. The risks, including potential monetary losses and damage to customer confidence and brand value, are far too great to ignore. But laying out a data security strategy and then implementing it is no easy feat. RSA, the leader in...

    Provided By RSA Security

  • Case Studies // Sep 2009

    RSA Security Solutions Speed Up Business for Liquigas

    Liquigas Distribuidora S/A is a private limited company founded in 1953 and operating across Brazil. The challenge was to improve security infrastructure to protect confidential corporate data from unauthorized access and to accelerate the business process and maintain company's market leadership position with remote connection to company network. Liquigas deployed...

    Provided By RSA Security

  • Case Studies // Sep 2009

    RSA SecurID Aids Highly-Secure Remote Hard Drive Encryption

    This government department ensures that the correct tax is paid at the right time, whether this relates to payment of taxes received by the department or entitlement to benefits paid. The challenge was to further improve the security of sensitive data, including Personally Identifiable Information and to deploy government-approved hard...

    Provided By RSA Security

  • Case Studies // Aug 2009

    RSA SecurID Ensures Strong Authentication for Secure Access to Criminal Justice Records

    The Kansas Bureau of Investigation (KBI) is the criminal investigative arm of the State of Kansas. It is responsible for providing investigative and laboratory services to criminal justice agencies as well as preventing crime in the State of Kansas. The challenge was to provide employees with real-time online access to...

    Provided By RSA Security

  • Case Studies // Apr 2009

    RSA SecurID and RSA Access Manager Strengthen and Centralize Security at EMC

    EMC is one of the world's leading providers of infrastructure information systems, software and services, employing approximately 40,000 people around the world. The challenge was to reduce the cost and complexity of managing authentication of employees and external users accessing its enterprise portals and business critical IT systems and to...

    Provided By RSA Security

  • Case Studies // Nov 2008

    The National Ministry of Education Relies Upon RSA to Rationalise Identity Management

    The French Ministry of Education is made up of 1,255,698 employees spread across 30 local education authorities. It incorporates 9,636 colleges and lycees, and 55,667 ecoles, equating to 12 million school children and 2.2 million college students. As part of the state's mission to make information systems accessible to the...

    Provided By RSA Security

  • Case Studies // Nov 2008

    Achieving Competitive Advantage by Securing Remote Users

    Founded in 1997 and based in Miramar, Florida, Arise Solutions Incorporated is the pioneer of flexible, outsourced virtual call center service solutions for organizations seeking to profitably increase revenue and address the staffing, cost and quality control issues associated with conventional contact centers. The challenge was the need to meet...

    Provided By RSA Security

  • Case Studies // Sep 2008

    Leading Non-Profit Organization Secures Remote Access Using RSA SecurID Authentication for Over 280 Offices

    The March of Dimes is the leading organization for pregnancy and baby health. With chapters nationwide and its premier event, March for Babies, the March of Dimes works to improve the health of babies by preventing birth defects, premature birth and infant mortality. The challenge was required on-demand access and...

    Provided By RSA Security

  • Case Studies // Sep 2008

    Proactive Security Monitoring With RSA enVision Platform

    The Depository Trust & Clearing Corporation (DTCC), through its subsidiaries, provides clearing, settlement and information services for equities, corporate and municipal bonds, government and mortgage-backed securities, money market instruments and over-the-counter derivatives. Since DTCC's work is highly regulated, information security is of utmost importance. Through security audits and SEC evaluations,...

    Provided By RSA Security

  • Case Studies // Jun 2008

    Delivering Clarity and Visibility With RSA enVision Technology

    CSC is a leading global consulting, systems integration and outsourcing company. The RSA enVision platform helps CSC to accelerate operations by consolidating the log management procedure so that the IT team can quickly and efficiently troubleshoot system, network and security issues. This allows experienced IT personnel more time to be...

    Provided By RSA Security

  • Case Studies // Jun 2008

    Leading Real Estate Developer Achieves Quality Security Information and Event Management With the RSA enVision Platform

    Preuksa is a real estate developer in Thailand which is dedicated to help home buyers make decisions. Preuksa has selected RSA enVision technology as the optimal platform to acquire and leverage security and compliance intelligence. The RSA enVision platform has provided the company accurate analysis and verifiable compliance with thorough...

    Provided By RSA Security

  • White Papers // Feb 2010

    6 Best Practices for Preventing Enterprise Data Loss.

    Enterprise data loss' cost businesses nearly $105 billion last year. So, how can companies protect themselves from a data loss catastrophe? This paper from RSA outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements.

    Provided By RSA Security

  • White Papers // Apr 2009

    Actionable Relief for Those Caught in the Middle:RSA Addresses the PCI Challenges of Level 2 Businesses

    With up to 6 million payment card transactions per year in some cases, the enterprise defined as Level 2 for PCI compliance faces a perplexing dilemma. The Level 2 business carries a level of responsibility for PCI compliance similar to that of the Level 1 enterprise. At the same time,...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA Solution Brief: Fighting Emerging Threats: How To Combat Man-In-The-Middle And Trojan Attacks

    Phishing still remains the main method that fraudsters use to attack financial institutions; though simple and cost-effective, it yields lucrative results. However, as financial institutions across the globe continue to deploy strong authentication, fraudsters are also finding more sophisticated ways to launch attacks. As the fraud landscape evolves, financial institutions...

    Provided By RSA Security

  • White Papers // Apr 2009

    Whitepaper: Four Best Practices for Secure Web Access

    The Web has created a wealth of new opportunities - enabling organizations to reduce costs, increase efficiency and provide "anytime anywhere" access to corporate resources for employees, customers and partners. As organizations shift from an internal to external focus, the traditional view of identity and access management (IAM) is changing,...

    Provided By RSA Security

  • White Papers // Apr 2009

    Magic Quadrant for Web Fraud Detection

    Web fraud detection vendors are experiencing high sales-growth rates, driven by increasing cyberattacks in a weakened global economy. Larger security vendors are refocusing their efforts in this area, while smaller, low-cost competitors typically provide better customer service and more innovation.

    Provided By RSA Security

  • White Papers // Apr 2009

    The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business

    This is a recurring question being asked by organizations around the globe. With the number of new and emerging security products being denoted by analysts as the "silver bullet" solution, it is critical to recognize that there are many authentication choices available on the market. Before making a final selection...

    Provided By RSA Security

  • White Papers // Apr 2009

    Case Study Whitepaper: Incorporating Data Loss Prevention into Daily Business Operations: How Microsoft® Did it

    Perhaps the biggest challenge facing organizations considering the implementation of a data loss prevention (DLP) solution is the daunting scope of the problem. Considering the volume of systems, data, employees and business processes potentially impacted, many CIOs, CISOs and CSOs struggle with identifying how and where to start. Implementing a...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA® Data Loss Prevention Suite: Uncover your risk, establish control

    RSA Data Loss Prevention (DLP) helps uncover business risk associated with the loss of sensitive data and dynamically lowers that risk through policy-based remediation and enforcement of controls. RSA DLP is designed to help mitigate this risk regardless of whether the data is at rest in a datacenter, moving as...

    Provided By RSA Security

  • White Papers // Apr 2009

    Magic Quadrant for Security Information and Event Management

    Funding for security information and event management(SIEM) technology deployments is driven in large part by the need to quickly address regulatory compliance issues, but most organizations also want to improve security monitoring capabilities. An optimal solution will support the real-time collection and analysis of log data from host systems, security...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA enVision® Platform Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures

    The job of Security Operations, whether a large organization with a dedicated staff and resources, or one person with multiple responsibilities, is to keep information assets secure by continually monitoring the organization's IT environment, anticipate and respond to immediate threats and long-term vulnerabilities, and provide advice and guidance on security...

    Provided By RSA Security

  • White Papers // Jul 2008

    Developing FIPS 140-Validated Solutions for the Federal Government Using RSA BSAFE Software

    The U.S. House of Representatives' Committee on Government Reform released the Fiscal Year 2007 edition of its Federal Information Security Management Act (FISMA) report. Unfortunately, the news was not good. The 25 major government agencies reported 8% of the IT systems remained uncertified/unaccredited while 14% of the systems lacked tested...

    Provided By RSA Security

  • White Papers // Dec 2007

    The Confessions Survey: Office Workers Reveal Everyday Behavior That Places Sensitive Information at Risk

    A holistic, information-centric security strategy takes people, process and technology into account and has a feedback mechanism. It is not enough to establish policy; actual insider behavior must be measured and tracked against established policy in order to keep security aligned with the business and in turn, to minimize information...

    Provided By RSA Security

  • White Papers // Aug 2009

    Guidelines and Considerations for Securing Your Microsoft SharePoint Environment

    Microsoft SharePoint can be an extremely powerful tool for sharing and collaborating on information, providing a flexible, distributed approach to management and control. However, its very strengths can also lead to a wide range of security and compliance problems. By moving the responsibility for what gets stored in SharePoint and...

    Provided By RSA Security

  • White Papers // Apr 2009

    Microsoft SharePoint: Understanding and Addressing the Information Security Challenges

    The RSA enVision platform enables IT security professionals and compliance officers to bring SharePoint within the scope of their compliance mechanisms. RSA enVision log management collects logs from RSA Data Loss Prevention and correlates SharePoint server activity to the enterprise security context. The RSA enVision platform identifies anomalies and vulnerabilities...

    Provided By RSA Security

  • White Papers // Jun 2009

    Five Key Considerations for Selecting a Data Loss Prevention Solution

    Data loss prevention is about more than just preventing sensitive data from being lost or mishandled. If that were the case, organizations would block every single transmission and prevent every sensitive file from being accessed or handled. If every file were blocked or encrypted, it would impede immensely on employee...

    Provided By RSA Security

  • White Papers // Apr 2009

    Enterprise Key Management: Deploying a New Generation of Solutions for Enterprise Key Management

    As enterprises rapidly broaden their use of encryption to protect sensitive information, the management of encryption keys has taken on new importance. There has been explosive growth in the number of entities performing encryption, the number of encryption keys being generated, and the number of individual key management systems being...

    Provided By RSA Security

  • White Papers // May 2009

    ROI and SIEM: How the RSA enVision Platform Delivers an Industry-Leading ROI

    This paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. "SIEM ROI" depends on several factors, including a user's compliance and security obligations, the size and complexity of the IT environment and any current log management processes.

    Provided By RSA Security

  • White Papers // Jul 2008

    Security Check: 7 Things to Consider When Evaluating Vendor Solutions for SIEM

    Solutions for Security Information and Event Management (SIEM) are becoming a must-have component of an organization's security infrastructure, playing an important role in threat detection, incident response, and forensics and security related compliance. Based on experience with more than 1,300 successful SIEM deployments in organizations of all sizes, RSA offers...

    Provided By RSA Security

  • White Papers // Jul 2007

    Log Management Best Practices: The Foundation for Comprehensive Security Information and Event Management

    Although best practices should be developed by each individual organization based on their particular environment, there are some general best practices which can be universally applied. This paper is intended to help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices...

    Provided By RSA Security

  • White Papers // Aug 2008

    Creating an Effective Security Operations Function

    When one think of a Security Operations Center (SOC), it often have an image of a large room, full of people sitting in neat rows, with their attention split between their desktop monitors and a big screen up-front - similar to the Houston Space Center during a Space Shuttle launch....

    Provided By RSA Security