RSA Security

Displaying 1-18 of 18 results

  • White Papers // Oct 2012

    Defending Against the Unknown Enemy: Applying FLIPIT to System Security

    Most cryptographic systems carry the basic assumption that entities are able to preserve the secrecy of their keys. With attacks today showing ever increasing sophistication, however, this tenet is eroding. "Advanced Persistent Threats" (APTs), for instance, leverage zero-day exploits and extensive system knowledge to achieve full compromise of cryptographic keys...

    Provided By RSA Security

  • White Papers // Feb 2010

    The RSA Authentication Decision Tree:Selecting the Best Authentication Solution for Your Business.

    "What is the best authentication solution for my business?" Before making a final selection, organizations must consider their user authentication needs, the threats, and their business objectives. This free RSA whitepaper looks at the Authentication Decision Tree - a tool to help organizations understand, evaluate and select the most appropriate...

    Provided By RSA Security

  • White Papers // Feb 2010

    Assuring User Identities During a Business Disruption.

    This RSA white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency - without lowering the security policy,...

    Provided By RSA Security

  • White Papers // Feb 2010

    6 Best Practices for Preventing Enterprise Data Loss.

    Enterprise data loss' cost businesses nearly $105 billion last year. So, how can companies protect themselves from a data loss catastrophe? This paper from RSA outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements.

    Provided By RSA Security

  • White Papers // Sep 2009

    Securing Sensitive Data With Tokenization: An Emerging Technology

    Tokenization is an emerging technology for protecting sensitive information, based on the well-established technique of substitution. It provides significant advantages compared to traditional encryption and other technologies such as format-preserving encryption. Tokenization can reduce the scope of threats to sensitive information and ease the burden of compliance management. It can...

    Provided By RSA Security

  • White Papers // Sep 2009

    Information Security and Privacy in Emerging Economies: Implications for Global Competitiveness

    Commerce, collaboration and communication have, throughout time, been enabled or hampered by the environment of trust, security and privacy in which they occur. In an increasingly fluid, interconnected global community, the ways in which creates trust, ensure privacy and provide security must evolve, and must take advantage of available best...

    Provided By RSA Security

  • White Papers // Sep 2009

    Security in the Call Center: Verifying Customer Identities Without the Inconvenience

    Off late many organizations looking to reduce costs, increase efficiency, and provide more self-service options for their customers have driven sales and service to the online channel. While the Internet offers many advantages, the live interaction offered through the Call Center is still a preferred method for many customers looking...

    Provided By RSA Security

  • White Papers // Sep 2009

    Business Success in a Dark Market: An Inside Look at How the Fraud Underground Operates

    The business of online fraud has developed into a sophisticated underground criminal operation that continues to evolve everyday. Much like a real-world business, fraud "Entrepreneurs" offer products and services for a profit, they fight to gain competitive advantage and market share, are continually innovating to improve their offerings and meet...

    Provided By RSA Security

  • White Papers // Aug 2009

    Guidelines and Considerations for Securing Your Microsoft SharePoint Environment

    Microsoft SharePoint can be an extremely powerful tool for sharing and collaborating on information, providing a flexible, distributed approach to management and control. However, its very strengths can also lead to a wide range of security and compliance problems. By moving the responsibility for what gets stored in SharePoint and...

    Provided By RSA Security

  • White Papers // Aug 2009

    Security Compliance in a Virtual World: Best Practices to Build a Solid Foundation

    Over time, IT and security teams and external auditors will increase their knowledge and competencies in virtualization. IT and security teams should work closely with each other and their internal and external auditors in the design and implementation of virtual systems and educate them about the specific risk management methods...

    Provided By RSA Security

  • White Papers // Aug 2009

    Assuring User Identities During a Business Disruption: Applying a Consistent Strong Authentication Policy to Business Continuity Planning

    This white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency - without lowering the security policy, opening...

    Provided By RSA Security

  • White Papers // Jun 2009

    Five Key Considerations for Selecting a Data Loss Prevention Solution

    Data loss prevention is about more than just preventing sensitive data from being lost or mishandled. If that were the case, organizations would block every single transmission and prevent every sensitive file from being accessed or handled. If every file were blocked or encrypted, it would impede immensely on employee...

    Provided By RSA Security

  • Resource Center // Jun 2009

    Authentication Decision Tree Tool

    The RSA Authentication Decision Tree Tool is an interactive tool to help organizations understand, evaluate and select the most appropriate authentication solution to meet the needs of their users and their business. It provides a framework to help narrow the selection of authentication solutions based on five critical factors.

    Provided By RSA Security

  • White Papers // May 2009

    ROI and SIEM: How the RSA enVision Platform Delivers an Industry-Leading ROI

    This paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. "SIEM ROI" depends on several factors, including a user's compliance and security obligations, the size and complexity of the IT environment and any current log management processes.

    Provided By RSA Security

  • White Papers // Apr 2009

    Whitepaper: Four Best Practices for Secure Web Access

    The Web has created a wealth of new opportunities - enabling organizations to reduce costs, increase efficiency and provide "anytime anywhere" access to corporate resources for employees, customers and partners. As organizations shift from an internal to external focus, the traditional view of identity and access management (IAM) is changing,...

    Provided By RSA Security

  • White Papers // Apr 2009

    Convenient Multi-Factor Authentication (MFA) for Web Portals & Enterprise Applications

    As the usage of online portals, SSL VPN applications, and Web Access Management (WAM) products continue to grow, so does the need for strong authentication to protect access to the information contained within them. Providing single-factor authentication, or password only protection, creates a significant security threat to organizations. Single-factor authentication...

    Provided By RSA Security

  • White Papers // Sep 2008

    The Relationship Between ISO 27002 and the EU Data Protection Directive

    The regulatory landscape for Information Security in Europe has grown ever more complex in recent years. As organisations, both public and private, recognise the inherent value of their information, and as the safety and reliability of electronic communications become ever more central to the ways in which it interacts with...

    Provided By RSA Security

  • White Papers // Jul 2007

    Log Management Best Practices: The Foundation for Comprehensive Security Information and Event Management

    Although best practices should be developed by each individual organization based on their particular environment, there are some general best practices which can be universally applied. This paper is intended to help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices...

    Provided By RSA Security

  • Resource Center // Jun 2009

    Authentication Decision Tree Tool

    The RSA Authentication Decision Tree Tool is an interactive tool to help organizations understand, evaluate and select the most appropriate authentication solution to meet the needs of their users and their business. It provides a framework to help narrow the selection of authentication solutions based on five critical factors.

    Provided By RSA Security

  • White Papers // Apr 2009

    Whitepaper: Four Best Practices for Secure Web Access

    The Web has created a wealth of new opportunities - enabling organizations to reduce costs, increase efficiency and provide "anytime anywhere" access to corporate resources for employees, customers and partners. As organizations shift from an internal to external focus, the traditional view of identity and access management (IAM) is changing,...

    Provided By RSA Security

  • White Papers // Feb 2010

    The RSA Authentication Decision Tree:Selecting the Best Authentication Solution for Your Business.

    "What is the best authentication solution for my business?" Before making a final selection, organizations must consider their user authentication needs, the threats, and their business objectives. This free RSA whitepaper looks at the Authentication Decision Tree - a tool to help organizations understand, evaluate and select the most appropriate...

    Provided By RSA Security

  • White Papers // Feb 2010

    Assuring User Identities During a Business Disruption.

    This RSA white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency - without lowering the security policy,...

    Provided By RSA Security

  • White Papers // Feb 2010

    6 Best Practices for Preventing Enterprise Data Loss.

    Enterprise data loss' cost businesses nearly $105 billion last year. So, how can companies protect themselves from a data loss catastrophe? This paper from RSA outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements.

    Provided By RSA Security

  • White Papers // Apr 2009

    Convenient Multi-Factor Authentication (MFA) for Web Portals & Enterprise Applications

    As the usage of online portals, SSL VPN applications, and Web Access Management (WAM) products continue to grow, so does the need for strong authentication to protect access to the information contained within them. Providing single-factor authentication, or password only protection, creates a significant security threat to organizations. Single-factor authentication...

    Provided By RSA Security

  • White Papers // Sep 2009

    Securing Sensitive Data With Tokenization: An Emerging Technology

    Tokenization is an emerging technology for protecting sensitive information, based on the well-established technique of substitution. It provides significant advantages compared to traditional encryption and other technologies such as format-preserving encryption. Tokenization can reduce the scope of threats to sensitive information and ease the burden of compliance management. It can...

    Provided By RSA Security

  • White Papers // Sep 2009

    Information Security and Privacy in Emerging Economies: Implications for Global Competitiveness

    Commerce, collaboration and communication have, throughout time, been enabled or hampered by the environment of trust, security and privacy in which they occur. In an increasingly fluid, interconnected global community, the ways in which creates trust, ensure privacy and provide security must evolve, and must take advantage of available best...

    Provided By RSA Security

  • White Papers // Aug 2009

    Guidelines and Considerations for Securing Your Microsoft SharePoint Environment

    Microsoft SharePoint can be an extremely powerful tool for sharing and collaborating on information, providing a flexible, distributed approach to management and control. However, its very strengths can also lead to a wide range of security and compliance problems. By moving the responsibility for what gets stored in SharePoint and...

    Provided By RSA Security

  • White Papers // Sep 2008

    The Relationship Between ISO 27002 and the EU Data Protection Directive

    The regulatory landscape for Information Security in Europe has grown ever more complex in recent years. As organisations, both public and private, recognise the inherent value of their information, and as the safety and reliability of electronic communications become ever more central to the ways in which it interacts with...

    Provided By RSA Security

  • White Papers // Aug 2009

    Security Compliance in a Virtual World: Best Practices to Build a Solid Foundation

    Over time, IT and security teams and external auditors will increase their knowledge and competencies in virtualization. IT and security teams should work closely with each other and their internal and external auditors in the design and implementation of virtual systems and educate them about the specific risk management methods...

    Provided By RSA Security

  • White Papers // Sep 2009

    Security in the Call Center: Verifying Customer Identities Without the Inconvenience

    Off late many organizations looking to reduce costs, increase efficiency, and provide more self-service options for their customers have driven sales and service to the online channel. While the Internet offers many advantages, the live interaction offered through the Call Center is still a preferred method for many customers looking...

    Provided By RSA Security

  • White Papers // Sep 2009

    Business Success in a Dark Market: An Inside Look at How the Fraud Underground Operates

    The business of online fraud has developed into a sophisticated underground criminal operation that continues to evolve everyday. Much like a real-world business, fraud "Entrepreneurs" offer products and services for a profit, they fight to gain competitive advantage and market share, are continually innovating to improve their offerings and meet...

    Provided By RSA Security

  • White Papers // Aug 2009

    Assuring User Identities During a Business Disruption: Applying a Consistent Strong Authentication Policy to Business Continuity Planning

    This white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency - without lowering the security policy, opening...

    Provided By RSA Security

  • White Papers // Jun 2009

    Five Key Considerations for Selecting a Data Loss Prevention Solution

    Data loss prevention is about more than just preventing sensitive data from being lost or mishandled. If that were the case, organizations would block every single transmission and prevent every sensitive file from being accessed or handled. If every file were blocked or encrypted, it would impede immensely on employee...

    Provided By RSA Security

  • White Papers // May 2009

    ROI and SIEM: How the RSA enVision Platform Delivers an Industry-Leading ROI

    This paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. "SIEM ROI" depends on several factors, including a user's compliance and security obligations, the size and complexity of the IT environment and any current log management processes.

    Provided By RSA Security

  • White Papers // Jul 2007

    Log Management Best Practices: The Foundation for Comprehensive Security Information and Event Management

    Although best practices should be developed by each individual organization based on their particular environment, there are some general best practices which can be universally applied. This paper is intended to help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices...

    Provided By RSA Security

  • White Papers // Oct 2012

    Defending Against the Unknown Enemy: Applying FLIPIT to System Security

    Most cryptographic systems carry the basic assumption that entities are able to preserve the secrecy of their keys. With attacks today showing ever increasing sophistication, however, this tenet is eroding. "Advanced Persistent Threats" (APTs), for instance, leverage zero-day exploits and extensive system knowledge to achieve full compromise of cryptographic keys...

    Provided By RSA Security