RSA Security

Displaying 1-40 of 80 results

  • White Papers // Oct 2012

    Defending Against the Unknown Enemy: Applying FLIPIT to System Security

    Most cryptographic systems carry the basic assumption that entities are able to preserve the secrecy of their keys. With attacks today showing ever increasing sophistication, however, this tenet is eroding. "Advanced Persistent Threats" (APTs), for instance, leverage zero-day exploits and extensive system knowledge to achieve full compromise of cryptographic keys...

    Provided By RSA Security

  • White Papers // Feb 2010

    The RSA Authentication Decision Tree:Selecting the Best Authentication Solution for Your Business.

    "What is the best authentication solution for my business?" Before making a final selection, organizations must consider their user authentication needs, the threats, and their business objectives. This free RSA whitepaper looks at the Authentication Decision Tree - a tool to help organizations understand, evaluate and select the most appropriate...

    Provided By RSA Security

  • White Papers // Feb 2010

    Assuring User Identities During a Business Disruption.

    This RSA white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency - without lowering the security policy,...

    Provided By RSA Security

  • White Papers // Feb 2010

    6 Best Practices for Preventing Enterprise Data Loss.

    Enterprise data loss' cost businesses nearly $105 billion last year. So, how can companies protect themselves from a data loss catastrophe? This paper from RSA outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements.

    Provided By RSA Security

  • Case Studies // Sep 2009

    Enhancing Customer Confidence With a Strategic Approach to Data Protection

    Operating in 180 countries worldwide, this company is dedicated to changing millions of lives for the better through providing access to safe, effective and affordable medicines and related health care services. The challenge was to comply with industry requirements and customer expectations that sensitive data, from new drug trial details...

    Provided By RSA Security

  • Case Studies // Sep 2009

    RSA Security Solutions Speed Up Business for Liquigas

    Liquigas Distribuidora S/A is a private limited company founded in 1953 and operating across Brazil. The challenge was to improve security infrastructure to protect confidential corporate data from unauthorized access and to accelerate the business process and maintain company's market leadership position with remote connection to company network. Liquigas deployed...

    Provided By RSA Security

  • Case Studies // Sep 2009

    RSA SecurID Aids Highly-Secure Remote Hard Drive Encryption

    This government department ensures that the correct tax is paid at the right time, whether this relates to payment of taxes received by the department or entitlement to benefits paid. The challenge was to further improve the security of sensitive data, including Personally Identifiable Information and to deploy government-approved hard...

    Provided By RSA Security

  • Case Studies // Sep 2009

    Local Authority Meets GCSX CoCo Compliance Challenge With RSA enVision

    The City of Salford is a local government district of Greater Manchester, England, with the status of a city and metropolitan borough. The challenge was to enable employees to access the Government Connect Secure Extranet (GCSX), giving them direct, secure communication with other government bodies and to meet GCSX Code...

    Provided By RSA Security

  • Case Studies // Sep 2009

    Centralised Security Monitoring Helps the Andorran Telecoms Operator Deploy a Comprehensive Security Policy Centred on Prevention

    Created in 1975, Andorra Telecom is the sole operator and manager of telecommunications services in the Principality of Andorra. The challenge was to centralise security information which was managed by disparate IT operations departments and to automate incident management to prevent intrusions and sensitive information leaks. Andorra Telecom deployed RSA...

    Provided By RSA Security

  • White Papers // Sep 2009

    Securing Sensitive Data With Tokenization: An Emerging Technology

    Tokenization is an emerging technology for protecting sensitive information, based on the well-established technique of substitution. It provides significant advantages compared to traditional encryption and other technologies such as format-preserving encryption. Tokenization can reduce the scope of threats to sensitive information and ease the burden of compliance management. It can...

    Provided By RSA Security

  • White Papers // Sep 2009

    Information Security and Privacy in Emerging Economies: Implications for Global Competitiveness

    Commerce, collaboration and communication have, throughout time, been enabled or hampered by the environment of trust, security and privacy in which they occur. In an increasingly fluid, interconnected global community, the ways in which creates trust, ensure privacy and provide security must evolve, and must take advantage of available best...

    Provided By RSA Security

  • White Papers // Sep 2009

    Security in the Call Center: Verifying Customer Identities Without the Inconvenience

    Off late many organizations looking to reduce costs, increase efficiency, and provide more self-service options for their customers have driven sales and service to the online channel. While the Internet offers many advantages, the live interaction offered through the Call Center is still a preferred method for many customers looking...

    Provided By RSA Security

  • White Papers // Sep 2009

    Business Success in a Dark Market: An Inside Look at How the Fraud Underground Operates

    The business of online fraud has developed into a sophisticated underground criminal operation that continues to evolve everyday. Much like a real-world business, fraud "Entrepreneurs" offer products and services for a profit, they fight to gain competitive advantage and market share, are continually innovating to improve their offerings and meet...

    Provided By RSA Security

  • Case Studies // Sep 2009

    Securing Online Banking on an Unprecedented Scale

    This large commercial bank in Asia serves over 12 million customers. The challenge was to offer compelling eBanking services with reliable security measures to protect transactions and reassure customers and to integrate new solution smoothly with bank's existing platform to minimize downtime and service disruption. Bank deployed RSA SecurID hardware...

    Provided By RSA Security

  • Case Studies // Aug 2009

    Extra Security Layer Gives Banca Popolare Di Sondrio (SUISSE) Competitive Edge

    Since its foundation in 1871, Banca Popolare di Sondrio has grown from being a small Italian bank to employing 2,300 people in 262 branches. The challenge was that it was keen to show customers that security measures were up-to-date, providing peace of mind that their savings and investments were safe...

    Provided By RSA Security

  • Case Studies // Aug 2009

    RSA SecurID Ensures Strong Authentication for Secure Access to Criminal Justice Records

    The Kansas Bureau of Investigation (KBI) is the criminal investigative arm of the State of Kansas. It is responsible for providing investigative and laboratory services to criminal justice agencies as well as preventing crime in the State of Kansas. The challenge was to provide employees with real-time online access to...

    Provided By RSA Security

  • Case Studies // Aug 2009

    TELUS Improves Compliance and Strengthens Security With the RSA enVision Platform

    TELUS is a leading national telecommunications company in Canada, with $9.7 billion of annual revenue and 11.6 million customer connections including 6.1 million wireless subscribers, 4.2 million wireline network access lines and 1.2 million Internet subscribers. The challenge was to comply with Payment Card Industry (PCI) security standards regulation by...

    Provided By RSA Security

  • Case Studies // Aug 2009

    RSA SecurID Helps NTT Europe Online Meet PCI DSS Compliance

    NTT Europe Online (NTTEO) provides managed hosting, security and application management services to enterprises globally. NTTEO wanted to become fully Payment Card Industry Data Security Standard (PCI DSS) compliant in all areas of its business, from its datacentres through to HR procedures and to meet one of the 150 PCI...

    Provided By RSA Security

  • White Papers // Aug 2009

    Security Compliance in a Virtual World: Best Practices to Build a Solid Foundation

    Over time, IT and security teams and external auditors will increase their knowledge and competencies in virtualization. IT and security teams should work closely with each other and their internal and external auditors in the design and implementation of virtual systems and educate them about the specific risk management methods...

    Provided By RSA Security

  • White Papers // Aug 2009

    Guidelines and Considerations for Securing Your Microsoft SharePoint Environment

    Microsoft SharePoint can be an extremely powerful tool for sharing and collaborating on information, providing a flexible, distributed approach to management and control. However, its very strengths can also lead to a wide range of security and compliance problems. By moving the responsibility for what gets stored in SharePoint and...

    Provided By RSA Security

  • White Papers // Aug 2009

    Assuring User Identities During a Business Disruption: Applying a Consistent Strong Authentication Policy to Business Continuity Planning

    This white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency - without lowering the security policy, opening...

    Provided By RSA Security

  • Case Studies // Aug 2009

    Customer Assurance Leads to Plunging Costs and Climbing Profits

    The company is one of the largest financial organisations in Europe with 40 million customers, over 10,000 branches and an operating profit of over $5 billion ($7 bn). The challenge was that organization needed to guarantee customer confidence in order to ensure adoption of online banking services and failure to...

    Provided By RSA Security

  • Case Studies // Aug 2009

    Online Fraud Plummets as European Banking Group Partners With RSA

    As one of the leading retail banks in Europe, with a number of market leading positions, this banking organisation serves over 30 million people. The challenge was to european banking group that was faced with mounting fraud costs following the introduction of an e-commerce scheme, 3D Secure, which shifted liability...

    Provided By RSA Security

  • Case Studies // Aug 2009

    Improving Security and Compliance, While Reducing Cost and Complexity

    A specialist provider of transaction services, with an automated payment platform processing over 90 million transactions on a peak day and a switching platform connecting over 60,000 ATMs. The challenge was to improve the overall security and simplify support of the company's heterogeneous IT environment and to standardise and centralise...

    Provided By RSA Security

  • Case Studies // Jul 2009

    HypoVereinsbank Increases Security Standards Across Its Network

    With around 23,000 employees, 631 branches and more than four million customers, HypoVereinsbank (HVB) is one of Germany's largest banks. The challenge was to restructure internal network infrastructure in order to improve overall security and to increase the operational security of server and application systems by setting up an internal...

    Provided By RSA Security

  • White Papers // Jun 2009

    Securing Sensitive Information With Identity and Access Assurance

    Identity and Access Management (IAM) is a combination of business and Information Technology (IT) practices designed to ensure that only the right people have the right access to the right resources and are doing the right things. While different organizations may place varying emphasis on different business drivers for implementing...

    Provided By RSA Security

  • White Papers // Jun 2009

    The Coming Storm of Regulation

    The continuing financial crisis that has gripped the world since mid-2008 is likely to cause a flood of new global regulations. The nature of this failure dictates a new approach to regulations that will drive transparency requirements and risk management adoption. Organizations throughout the world will need to effectively manage...

    Provided By RSA Security

  • White Papers // Jun 2009

    Five Key Considerations for Selecting a Data Loss Prevention Solution

    Data loss prevention is about more than just preventing sensitive data from being lost or mishandled. If that were the case, organizations would block every single transmission and prevent every sensitive file from being accessed or handled. If every file were blocked or encrypted, it would impede immensely on employee...

    Provided By RSA Security

  • Resource Center // Jun 2009

    Authentication Decision Tree Tool

    The RSA Authentication Decision Tree Tool is an interactive tool to help organizations understand, evaluate and select the most appropriate authentication solution to meet the needs of their users and their business. It provides a framework to help narrow the selection of authentication solutions based on five critical factors.

    Provided By RSA Security

  • White Papers // Jun 2009

    The RSA Authentication Decision Tree: Selecting the Best Authentication Method for Your Business White Paper

    The RSA Authentication Decision Tree: Selecting the Best Authentication Method for Your Business White Paper provides an overview of the RSA Authentication Decision Tree, examines the 5 factors critical to selecting an authentication solution, and offers a clear guide to selecting the right solution that effectively balances risk, cost and...

    Provided By RSA Security

  • White Papers // May 2009

    Information-Centric Security for the Virtual Data Center

    Marrying the flexibility and agility of virtualization with the needs of the contemporary enterprise for information security, privacy and compliance demands that more intelligence and decision-making around security be embedded in the infrastructure itself. RSA's risk-based approach helps customers ensure security and compliance without sacrificing the operational flexibility and mobility...

    Provided By RSA Security

  • White Papers // May 2009

    Four Best Practices for Secure Web Access

    Securing web access is critical to protect against the threat of sensitive corporate data ending up in the wrong hands. As organizations extend access to more users and enable information sharing across more applications and systems, a secure web access strategy is essential. By following these best practices, organizations can...

    Provided By RSA Security

  • White Papers // May 2009

    ROI and SIEM: How the RSA enVision Platform Delivers an Industry-Leading ROI

    This paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. "SIEM ROI" depends on several factors, including a user's compliance and security obligations, the size and complexity of the IT environment and any current log management processes.

    Provided By RSA Security

  • Case Studies // May 2009

    Safeguarding Patient Privacy With Security Information and Event Management

    One of four hospitals affiliated with the University of Oslo, Akershus University Hospital (Ahus), is situated in the Lorenskog municipality in the south east of Norway. The challenge was to ensure all healthcare institutions in Norway comply with national and European data protection regulation and identify and implement scalable platform...

    Provided By RSA Security

  • White Papers // Apr 2009

    Securing Customer Proprietary Network Information: The Telecommunication Carriers' Challenge

    According to the United States Federal Communications Commission (FCC), major security breaches between February 2005 and April 2007 resulted in the Customer Proprietary Network Information (CPNI) of over 54 million Americans to be compromised, including consumer call detail information, billing and other personally identifiable information (PII). These breaches represent a...

    Provided By RSA Security

  • White Papers // Apr 2009

    The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business

    This is a recurring question being asked by organizations around the globe. With the number of new and emerging security products being denoted by analysts as the "silver bullet" solution, it is critical to recognize that there are many authentication choices available on the market. Before making a final selection...

    Provided By RSA Security

  • White Papers // Apr 2009

    Case Study Whitepaper: Incorporating Data Loss Prevention into Daily Business Operations: How Microsoft® Did it

    Perhaps the biggest challenge facing organizations considering the implementation of a data loss prevention (DLP) solution is the daunting scope of the problem. Considering the volume of systems, data, employees and business processes potentially impacted, many CIOs, CISOs and CSOs struggle with identifying how and where to start. Implementing a...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA® Data Loss Prevention Suite: Uncover your risk, establish control

    RSA Data Loss Prevention (DLP) helps uncover business risk associated with the loss of sensitive data and dynamically lowers that risk through policy-based remediation and enforcement of controls. RSA DLP is designed to help mitigate this risk regardless of whether the data is at rest in a datacenter, moving as...

    Provided By RSA Security

  • White Papers // Apr 2009

    Magic Quadrant for Security Information and Event Management

    Funding for security information and event management(SIEM) technology deployments is driven in large part by the need to quickly address regulatory compliance issues, but most organizations also want to improve security monitoring capabilities. An optimal solution will support the real-time collection and analysis of log data from host systems, security...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA enVision® Platform Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures

    The job of Security Operations, whether a large organization with a dedicated staff and resources, or one person with multiple responsibilities, is to keep information assets secure by continually monitoring the organization's IT environment, anticipate and respond to immediate threats and long-term vulnerabilities, and provide advice and guidance on security...

    Provided By RSA Security

  • Case Studies // Aug 2009

    Extra Security Layer Gives Banca Popolare Di Sondrio (SUISSE) Competitive Edge

    Since its foundation in 1871, Banca Popolare di Sondrio has grown from being a small Italian bank to employing 2,300 people in 262 branches. The challenge was that it was keen to show customers that security measures were up-to-date, providing peace of mind that their savings and investments were safe...

    Provided By RSA Security

  • Case Studies // Jul 2009

    HypoVereinsbank Increases Security Standards Across Its Network

    With around 23,000 employees, 631 branches and more than four million customers, HypoVereinsbank (HVB) is one of Germany's largest banks. The challenge was to restructure internal network infrastructure in order to improve overall security and to increase the operational security of server and application systems by setting up an internal...

    Provided By RSA Security

  • Case Studies // Apr 2009

    Investing in Customer Banking Protection With an Online Anti-Fraud Strategy

    As a leading financial institution in India and named by Forbes magazine as one of the best 50 companies in Asia Pacific, HDFC Bank is committed to leading the industry in terms of customer service. The challenge was to maintain bank's position as an industry-leader in innovative products and services...

    Provided By RSA Security

  • Case Studies // Mar 2009

    Enhancing Authentication and Improving the Customer Experience

    Mizuho Bank is the core banking company of Mizuho Financial Group, one of Japan's three mega-banks and one of the country's largest retail banks, with more than 25 million accounts. Mizuho Direct is the company's comprehensive online banking service, attracting 100,000 users per month and continuing to grow. The challenge...

    Provided By RSA Security

  • Case Studies // Mar 2009

    Bajaj Capital Drives Dynamic Online Portal Forward With Two-Factor Authentication

    The Bajaj Capital Group is one of India's leading investment advisory and financial planning companies. Headquartered in New Delhi, it has a presence in all of the subcontinent's major cities including Mumbai, Chennai, Kolkata and Bangalore, and since 1965 has been providing a range of services to private and institutional...

    Provided By RSA Security

  • Case Studies // Feb 2009

    RSA SecurID Technology Reinforces Online Banking Confidence Among Asia United Bank Customers

    Asia United Bank (AUB) is a domestic commercial bank with headquarters in Pasig City, Philippines. The challenge was to protect customers' sensitive account information in the face of increasing threats from Internet-based theft and fraud and to ensure AUB continues to lead the Asia-Pacific financial industry in terms of technological...

    Provided By RSA Security

  • Case Studies // Sep 2009

    Enhancing Customer Confidence With a Strategic Approach to Data Protection

    Operating in 180 countries worldwide, this company is dedicated to changing millions of lives for the better through providing access to safe, effective and affordable medicines and related health care services. The challenge was to comply with industry requirements and customer expectations that sensitive data, from new drug trial details...

    Provided By RSA Security

  • Case Studies // Sep 2009

    RSA Security Solutions Speed Up Business for Liquigas

    Liquigas Distribuidora S/A is a private limited company founded in 1953 and operating across Brazil. The challenge was to improve security infrastructure to protect confidential corporate data from unauthorized access and to accelerate the business process and maintain company's market leadership position with remote connection to company network. Liquigas deployed...

    Provided By RSA Security

  • Case Studies // Sep 2009

    RSA SecurID Aids Highly-Secure Remote Hard Drive Encryption

    This government department ensures that the correct tax is paid at the right time, whether this relates to payment of taxes received by the department or entitlement to benefits paid. The challenge was to further improve the security of sensitive data, including Personally Identifiable Information and to deploy government-approved hard...

    Provided By RSA Security

  • Case Studies // Aug 2009

    RSA SecurID Ensures Strong Authentication for Secure Access to Criminal Justice Records

    The Kansas Bureau of Investigation (KBI) is the criminal investigative arm of the State of Kansas. It is responsible for providing investigative and laboratory services to criminal justice agencies as well as preventing crime in the State of Kansas. The challenge was to provide employees with real-time online access to...

    Provided By RSA Security

  • Case Studies // Apr 2009

    RSA SecurID and RSA Access Manager Strengthen and Centralize Security at EMC

    EMC is one of the world's leading providers of infrastructure information systems, software and services, employing approximately 40,000 people around the world. The challenge was to reduce the cost and complexity of managing authentication of employees and external users accessing its enterprise portals and business critical IT systems and to...

    Provided By RSA Security

  • Case Studies // Nov 2008

    The National Ministry of Education Relies Upon RSA to Rationalise Identity Management

    The French Ministry of Education is made up of 1,255,698 employees spread across 30 local education authorities. It incorporates 9,636 colleges and lycees, and 55,667 ecoles, equating to 12 million school children and 2.2 million college students. As part of the state's mission to make information systems accessible to the...

    Provided By RSA Security

  • Case Studies // Nov 2008

    Achieving Competitive Advantage by Securing Remote Users

    Founded in 1997 and based in Miramar, Florida, Arise Solutions Incorporated is the pioneer of flexible, outsourced virtual call center service solutions for organizations seeking to profitably increase revenue and address the staffing, cost and quality control issues associated with conventional contact centers. The challenge was the need to meet...

    Provided By RSA Security

  • Case Studies // Sep 2008

    Leading Non-Profit Organization Secures Remote Access Using RSA SecurID Authentication for Over 280 Offices

    The March of Dimes is the leading organization for pregnancy and baby health. With chapters nationwide and its premier event, March for Babies, the March of Dimes works to improve the health of babies by preventing birth defects, premature birth and infant mortality. The challenge was required on-demand access and...

    Provided By RSA Security

  • Case Studies // Sep 2008

    Proactive Security Monitoring With RSA enVision Platform

    The Depository Trust & Clearing Corporation (DTCC), through its subsidiaries, provides clearing, settlement and information services for equities, corporate and municipal bonds, government and mortgage-backed securities, money market instruments and over-the-counter derivatives. Since DTCC's work is highly regulated, information security is of utmost importance. Through security audits and SEC evaluations,...

    Provided By RSA Security

  • Case Studies // Jan 2009

    Secure Soaring at Britannia Airways

    Britannia Airways, Luton, Bedfordshire, U.K is leading charter airline in the United Kingdom. Britannia briefs pilots, cabin crew and ground staff before each flight, covering everything from individual passengers with special needs to the latest bulletins from aviation officials. Britannia Airways RSASecurID two-factor authentication provides strong protection against unauthorized access...

    Provided By RSA Security

  • Case Studies // Jan 2009

    Employee HR Intranet Is Protected by Suite of RSA Security Solutions

    In a fast-paced financial services environment, employees need to be as efficient as possible. Waiting on crowded phone lines for information about 401(k) accounts, health insurance plans or vacation status obviously cut heavily into their productivity. An intranet that provided simple yet secure access would let employees quickly retrieve the...

    Provided By RSA Security

  • Case Studies // Jan 2009

    Law Firm Protects Newly Built HQ With RSA Security's Smart Badging Solution

    Formed in 1968, Post & Schell has more than 150 lawyers in six offices - five in Pennsylvania and one in New Jersey. The challenge was to have a blank slate to build a security system; he also recognized the risk that if he made the system too difficult or...

    Provided By RSA Security

  • Case Studies // Apr 2009

    Rapattoni Builds Business by Protecting Customer Interests

    Rapattoni is one of the leading software providers for the US real-estate industry. It wanted to ensure that personally identifiable information such as sensitive homeowner information was not unintentionally compromised and it also wanted to strengthen and grow its market position in a small but fiercely competitive market. Rapattoni deployed...

    Provided By RSA Security

  • Case Studies // Aug 2009

    TELUS Improves Compliance and Strengthens Security With the RSA enVision Platform

    TELUS is a leading national telecommunications company in Canada, with $9.7 billion of annual revenue and 11.6 million customer connections including 6.1 million wireless subscribers, 4.2 million wireline network access lines and 1.2 million Internet subscribers. The challenge was to comply with Payment Card Industry (PCI) security standards regulation by...

    Provided By RSA Security

  • Case Studies // Mar 2009

    EMC Secures Mission-Critical Intellectual Property Scattered Throughout the World

    EMC is one of the world's leading providers of infrastructure information systems, software and services, employing approximately, 40,000 people around the world. EMC needed to locate and protect mission-critical source code and business-critical information, gained from over 40 acquisitions that was scattered across multiple business units and controlled by disparate...

    Provided By RSA Security

  • Case Studies // Apr 2009

    Single View Into Global Network Delivers Significant Cost Benefits

    EMC is one of the world's leading providers of infrastructure information systems, software and services, employing approximately, 40,000 people around the world. The challenge was to reduce the cost and improve the efficiency of a system designed to gather security log information from thousands of network devices on a global...

    Provided By RSA Security

  • Case Studies // Apr 2009

    AMD Offers Distributors Secure Risk-Based Single Sign-On to Enterprise Portals, Thereby Sharpening Its Competitive Edge

    AMD designs and produces innovative microprocessor and graphics and media solutions. It is focused on best meeting the needs of leading computing, wireless and consumer electronics companies to help them deliver high-performance, energy-efficient and visually realistic solutions. The challenge was to speed up the time it takes to approve external...

    Provided By RSA Security

  • Case Studies // Dec 2008

    The RSA Data Loss Prevention (DLP) Suite Helps a Technology Leader Discover Sensitive Data

    As a level 1 processor of credit cards, Microsoft clearly had to tackle the Payment Card Industry (PCI) Data Security Standard as part of its content security initiative. The challenge was to adhering to Payment Card Industry (PCI) and Sarbanes-Oxley regulatory Compliances and to secure Intellectual Property such as source...

    Provided By RSA Security

  • Case Studies // Mar 2009

    Gleaning Log Data for Security, Operational and Compliance Success

    Computer Sciences Corporation (CSC) is a leading global consulting, systems integration and outsourcing company. The challenge was that it needed a solution to solve the immediate challenge of collecting and analysing log data on behalf of a large health organization and wanted to build a more compelling security offering for...

    Provided By RSA Security

  • Case Studies // Feb 2009

    RSA Security Case Study: Banco Sabadell and RSA Transaction Monitoring

    Banco Sabadell, founded in 1881, forms part of the IBEX35 and currently heads Spain's fourth largest banking group. In early 2008 Banco Sabadell deployed RSA Transaction Monitoring, an online fraud detection and monitoring solution as an additional layer of security on top of their existing strong authentication login protection and...

    Provided By RSA Security

  • Case Studies // Sep 2009

    Local Authority Meets GCSX CoCo Compliance Challenge With RSA enVision

    The City of Salford is a local government district of Greater Manchester, England, with the status of a city and metropolitan borough. The challenge was to enable employees to access the Government Connect Secure Extranet (GCSX), giving them direct, secure communication with other government bodies and to meet GCSX Code...

    Provided By RSA Security

  • Case Studies // Aug 2009

    RSA SecurID Helps NTT Europe Online Meet PCI DSS Compliance

    NTT Europe Online (NTTEO) provides managed hosting, security and application management services to enterprises globally. NTTEO wanted to become fully Payment Card Industry Data Security Standard (PCI DSS) compliant in all areas of its business, from its datacentres through to HR procedures and to meet one of the 150 PCI...

    Provided By RSA Security

  • Case Studies // Sep 2009

    Centralised Security Monitoring Helps the Andorran Telecoms Operator Deploy a Comprehensive Security Policy Centred on Prevention

    Created in 1975, Andorra Telecom is the sole operator and manager of telecommunications services in the Principality of Andorra. The challenge was to centralise security information which was managed by disparate IT operations departments and to automate incident management to prevent intrusions and sensitive information leaks. Andorra Telecom deployed RSA...

    Provided By RSA Security

  • White Papers // Jun 2009

    Securing Sensitive Information With Identity and Access Assurance

    Identity and Access Management (IAM) is a combination of business and Information Technology (IT) practices designed to ensure that only the right people have the right access to the right resources and are doing the right things. While different organizations may place varying emphasis on different business drivers for implementing...

    Provided By RSA Security

  • White Papers // Apr 2009

    The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business

    This is a recurring question being asked by organizations around the globe. With the number of new and emerging security products being denoted by analysts as the "silver bullet" solution, it is critical to recognize that there are many authentication choices available on the market. Before making a final selection...

    Provided By RSA Security

  • White Papers // Apr 2009

    Case Study Whitepaper: Incorporating Data Loss Prevention into Daily Business Operations: How Microsoft® Did it

    Perhaps the biggest challenge facing organizations considering the implementation of a data loss prevention (DLP) solution is the daunting scope of the problem. Considering the volume of systems, data, employees and business processes potentially impacted, many CIOs, CISOs and CSOs struggle with identifying how and where to start. Implementing a...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA® Data Loss Prevention Suite: Uncover your risk, establish control

    RSA Data Loss Prevention (DLP) helps uncover business risk associated with the loss of sensitive data and dynamically lowers that risk through policy-based remediation and enforcement of controls. RSA DLP is designed to help mitigate this risk regardless of whether the data is at rest in a datacenter, moving as...

    Provided By RSA Security

  • White Papers // Apr 2009

    Magic Quadrant for Security Information and Event Management

    Funding for security information and event management(SIEM) technology deployments is driven in large part by the need to quickly address regulatory compliance issues, but most organizations also want to improve security monitoring capabilities. An optimal solution will support the real-time collection and analysis of log data from host systems, security...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA enVision® Platform Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures

    The job of Security Operations, whether a large organization with a dedicated staff and resources, or one person with multiple responsibilities, is to keep information assets secure by continually monitoring the organization's IT environment, anticipate and respond to immediate threats and long-term vulnerabilities, and provide advice and guidance on security...

    Provided By RSA Security

  • White Papers // Apr 2009

    Luxair enhances customer service and guarantees compliance with integrated log monitoring and real-time reporting

    Luxair is the national airline of the Grand Duchy of Luxembourg, with 19 regular European destinations. The company is part of LuxairGroup, a key player in the national and regional economies, which employs more than 2,300 people. The airline was created in 1948 and has been offering high quality services...

    Provided By RSA Security

  • White Papers // Apr 2009

    Log Management Best Practices The Foundation for Comprehensive Security Information and Event Management

    Log (event) management is the collection, analysis (real-time or historical), storage and management of logs from a range of sources across the enterprise. It is the foundation for comprehensive security information and event management (SIEM). Organizations which develop best practices in log management will get timely analysis of their security...

    Provided By RSA Security

  • White Papers // Apr 2009

    Driving Fast and Forward: Managing Information Security for Strategic Advantage in a Tough Economy

    Enterprises worldwide face escalating economic uncertainty; yet at the same time, the forces of globalization and technology continue to offer tremendous opportunities. Navigating the road ahead will be challenging. It will require that enterprises use not only the power of business innovation but also the ability to manage risk for...

    Provided By RSA Security

  • White Papers // Apr 2009

    Developing a Sustainable and Cost Effective IT Compliance Program

    Complying with laws and regulations is an increasing burden for organizations, from the board of directors down to the trenches of business. Over the past ten years there has been a significant and growing impact of regulatory compliance specifically on the IT department. In a nutshell: business is complex and...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA® Solutions for Securing Critical Cyber Assets within Electric Utilities

    Today, electric utilities are faced with the ever-growing threat of cyber intrusion which poses a huge risk to businesses and power customers. While hackers have targeted electric utilities and have been the cause of multiple power outages globally, the problem is one that poses a particular threat to US &...

    Provided By RSA Security