RSA Security

Displaying 1-40 of 43 results

  • White Papers // Oct 2012

    Defending Against the Unknown Enemy: Applying FLIPIT to System Security

    Most cryptographic systems carry the basic assumption that entities are able to preserve the secrecy of their keys. With attacks today showing ever increasing sophistication, however, this tenet is eroding. "Advanced Persistent Threats" (APTs), for instance, leverage zero-day exploits and extensive system knowledge to achieve full compromise of cryptographic keys...

    Provided By RSA Security

  • White Papers // Feb 2010

    The RSA Authentication Decision Tree:Selecting the Best Authentication Solution for Your Business.

    "What is the best authentication solution for my business?" Before making a final selection, organizations must consider their user authentication needs, the threats, and their business objectives. This free RSA whitepaper looks at the Authentication Decision Tree - a tool to help organizations understand, evaluate and select the most appropriate...

    Provided By RSA Security

  • White Papers // Feb 2010

    Assuring User Identities During a Business Disruption.

    This RSA white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency - without lowering the security policy,...

    Provided By RSA Security

  • White Papers // Feb 2010

    6 Best Practices for Preventing Enterprise Data Loss.

    Enterprise data loss' cost businesses nearly $105 billion last year. So, how can companies protect themselves from a data loss catastrophe? This paper from RSA outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements.

    Provided By RSA Security

  • White Papers // Sep 2009

    Securing Sensitive Data With Tokenization: An Emerging Technology

    Tokenization is an emerging technology for protecting sensitive information, based on the well-established technique of substitution. It provides significant advantages compared to traditional encryption and other technologies such as format-preserving encryption. Tokenization can reduce the scope of threats to sensitive information and ease the burden of compliance management. It can...

    Provided By RSA Security

  • White Papers // Sep 2009

    Information Security and Privacy in Emerging Economies: Implications for Global Competitiveness

    Commerce, collaboration and communication have, throughout time, been enabled or hampered by the environment of trust, security and privacy in which they occur. In an increasingly fluid, interconnected global community, the ways in which creates trust, ensure privacy and provide security must evolve, and must take advantage of available best...

    Provided By RSA Security

  • White Papers // Sep 2009

    Security in the Call Center: Verifying Customer Identities Without the Inconvenience

    Off late many organizations looking to reduce costs, increase efficiency, and provide more self-service options for their customers have driven sales and service to the online channel. While the Internet offers many advantages, the live interaction offered through the Call Center is still a preferred method for many customers looking...

    Provided By RSA Security

  • White Papers // Sep 2009

    Business Success in a Dark Market: An Inside Look at How the Fraud Underground Operates

    The business of online fraud has developed into a sophisticated underground criminal operation that continues to evolve everyday. Much like a real-world business, fraud "Entrepreneurs" offer products and services for a profit, they fight to gain competitive advantage and market share, are continually innovating to improve their offerings and meet...

    Provided By RSA Security

  • White Papers // Aug 2009

    Security Compliance in a Virtual World: Best Practices to Build a Solid Foundation

    Over time, IT and security teams and external auditors will increase their knowledge and competencies in virtualization. IT and security teams should work closely with each other and their internal and external auditors in the design and implementation of virtual systems and educate them about the specific risk management methods...

    Provided By RSA Security

  • White Papers // Aug 2009

    Guidelines and Considerations for Securing Your Microsoft SharePoint Environment

    Microsoft SharePoint can be an extremely powerful tool for sharing and collaborating on information, providing a flexible, distributed approach to management and control. However, its very strengths can also lead to a wide range of security and compliance problems. By moving the responsibility for what gets stored in SharePoint and...

    Provided By RSA Security

  • White Papers // Aug 2009

    Assuring User Identities During a Business Disruption: Applying a Consistent Strong Authentication Policy to Business Continuity Planning

    This white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency - without lowering the security policy, opening...

    Provided By RSA Security

  • White Papers // Jun 2009

    Securing Sensitive Information With Identity and Access Assurance

    Identity and Access Management (IAM) is a combination of business and Information Technology (IT) practices designed to ensure that only the right people have the right access to the right resources and are doing the right things. While different organizations may place varying emphasis on different business drivers for implementing...

    Provided By RSA Security

  • White Papers // Jun 2009

    The Coming Storm of Regulation

    The continuing financial crisis that has gripped the world since mid-2008 is likely to cause a flood of new global regulations. The nature of this failure dictates a new approach to regulations that will drive transparency requirements and risk management adoption. Organizations throughout the world will need to effectively manage...

    Provided By RSA Security

  • White Papers // Jun 2009

    Five Key Considerations for Selecting a Data Loss Prevention Solution

    Data loss prevention is about more than just preventing sensitive data from being lost or mishandled. If that were the case, organizations would block every single transmission and prevent every sensitive file from being accessed or handled. If every file were blocked or encrypted, it would impede immensely on employee...

    Provided By RSA Security

  • Resource Center // Jun 2009

    Authentication Decision Tree Tool

    The RSA Authentication Decision Tree Tool is an interactive tool to help organizations understand, evaluate and select the most appropriate authentication solution to meet the needs of their users and their business. It provides a framework to help narrow the selection of authentication solutions based on five critical factors.

    Provided By RSA Security

  • White Papers // May 2009

    Information-Centric Security for the Virtual Data Center

    Marrying the flexibility and agility of virtualization with the needs of the contemporary enterprise for information security, privacy and compliance demands that more intelligence and decision-making around security be embedded in the infrastructure itself. RSA's risk-based approach helps customers ensure security and compliance without sacrificing the operational flexibility and mobility...

    Provided By RSA Security

  • White Papers // May 2009

    Four Best Practices for Secure Web Access

    Securing web access is critical to protect against the threat of sensitive corporate data ending up in the wrong hands. As organizations extend access to more users and enable information sharing across more applications and systems, a secure web access strategy is essential. By following these best practices, organizations can...

    Provided By RSA Security

  • White Papers // May 2009

    ROI and SIEM: How the RSA enVision Platform Delivers an Industry-Leading ROI

    This paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. "SIEM ROI" depends on several factors, including a user's compliance and security obligations, the size and complexity of the IT environment and any current log management processes.

    Provided By RSA Security

  • White Papers // Apr 2009

    Securing Customer Proprietary Network Information: The Telecommunication Carriers' Challenge

    According to the United States Federal Communications Commission (FCC), major security breaches between February 2005 and April 2007 resulted in the Customer Proprietary Network Information (CPNI) of over 54 million Americans to be compromised, including consumer call detail information, billing and other personally identifiable information (PII). These breaches represent a...

    Provided By RSA Security

  • White Papers // Apr 2009

    The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business

    This is a recurring question being asked by organizations around the globe. With the number of new and emerging security products being denoted by analysts as the "silver bullet" solution, it is critical to recognize that there are many authentication choices available on the market. Before making a final selection...

    Provided By RSA Security

  • White Papers // Apr 2009

    Case Study Whitepaper: Incorporating Data Loss Prevention into Daily Business Operations: How Microsoft® Did it

    Perhaps the biggest challenge facing organizations considering the implementation of a data loss prevention (DLP) solution is the daunting scope of the problem. Considering the volume of systems, data, employees and business processes potentially impacted, many CIOs, CISOs and CSOs struggle with identifying how and where to start. Implementing a...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA® Data Loss Prevention Suite: Uncover your risk, establish control

    RSA Data Loss Prevention (DLP) helps uncover business risk associated with the loss of sensitive data and dynamically lowers that risk through policy-based remediation and enforcement of controls. RSA DLP is designed to help mitigate this risk regardless of whether the data is at rest in a datacenter, moving as...

    Provided By RSA Security

  • White Papers // Apr 2009

    Magic Quadrant for Security Information and Event Management

    Funding for security information and event management(SIEM) technology deployments is driven in large part by the need to quickly address regulatory compliance issues, but most organizations also want to improve security monitoring capabilities. An optimal solution will support the real-time collection and analysis of log data from host systems, security...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA enVision® Platform Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures

    The job of Security Operations, whether a large organization with a dedicated staff and resources, or one person with multiple responsibilities, is to keep information assets secure by continually monitoring the organization's IT environment, anticipate and respond to immediate threats and long-term vulnerabilities, and provide advice and guidance on security...

    Provided By RSA Security

  • White Papers // Apr 2009

    Log Management Best Practices The Foundation for Comprehensive Security Information and Event Management

    Log (event) management is the collection, analysis (real-time or historical), storage and management of logs from a range of sources across the enterprise. It is the foundation for comprehensive security information and event management (SIEM). Organizations which develop best practices in log management will get timely analysis of their security...

    Provided By RSA Security

  • White Papers // Apr 2009

    Driving Fast and Forward: Managing Information Security for Strategic Advantage in a Tough Economy

    Enterprises worldwide face escalating economic uncertainty; yet at the same time, the forces of globalization and technology continue to offer tremendous opportunities. Navigating the road ahead will be challenging. It will require that enterprises use not only the power of business innovation but also the ability to manage risk for...

    Provided By RSA Security

  • White Papers // Apr 2009

    Developing a Sustainable and Cost Effective IT Compliance Program

    Complying with laws and regulations is an increasing burden for organizations, from the board of directors down to the trenches of business. Over the past ten years there has been a significant and growing impact of regulatory compliance specifically on the IT department. In a nutshell: business is complex and...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA® Solutions for Securing Critical Cyber Assets within Electric Utilities

    Today, electric utilities are faced with the ever-growing threat of cyber intrusion which poses a huge risk to businesses and power customers. While hackers have targeted electric utilities and have been the cause of multiple power outages globally, the problem is one that poses a particular threat to US &...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA PCI Solutions for Retail

    Accelerating PCI Compliance and Your Business - Discover cardholder data - Assess areas of non-compliance and prioritize remediation activities - Encrypt cardholder data from point-of-sale applications onward and manage encryption keys - Authenticate users and authorize access to cardholder data and related systems - Manage logs and ease the process...

    Provided By RSA Security

  • White Papers // Apr 2009

    Actionable Relief for Those Caught in the Middle:RSA Addresses the PCI Challenges of Level 2 Businesses

    With up to 6 million payment card transactions per year in some cases, the enterprise defined as Level 2 for PCI compliance faces a perplexing dilemma. The Level 2 business carries a level of responsibility for PCI compliance similar to that of the Level 1 enterprise. At the same time,...

    Provided By RSA Security

  • White Papers // Apr 2009

    Whitepaper: Four Best Practices for Secure Web Access

    The Web has created a wealth of new opportunities - enabling organizations to reduce costs, increase efficiency and provide "anytime anywhere" access to corporate resources for employees, customers and partners. As organizations shift from an internal to external focus, the traditional view of identity and access management (IAM) is changing,...

    Provided By RSA Security

  • White Papers // Apr 2009

    Magic Quadrant for Web Fraud Detection

    Web fraud detection vendors are experiencing high sales-growth rates, driven by increasing cyberattacks in a weakened global economy. Larger security vendors are refocusing their efforts in this area, while smaller, low-cost competitors typically provide better customer service and more innovation.

    Provided By RSA Security

  • White Papers // Apr 2009

    6 Best Practices for Preventing Enterprise Data Loss

    Protecting a company from enterprise data loss is a strategic necessity. The risks, including potential monetary losses and damage to customer confidence and brand value, are far too great to ignore. But laying out a data security strategy and then implementing it is no easy feat. RSA, the leader in...

    Provided By RSA Security

  • White Papers // Apr 2009

    Microsoft SharePoint: Understanding and Addressing the Information Security Challenges

    The RSA enVision platform enables IT security professionals and compliance officers to bring SharePoint within the scope of their compliance mechanisms. RSA enVision log management collects logs from RSA Data Loss Prevention and correlates SharePoint server activity to the enterprise security context. The RSA enVision platform identifies anomalies and vulnerabilities...

    Provided By RSA Security

  • White Papers // Apr 2009

    Enterprise Key Management: Deploying a New Generation of Solutions for Enterprise Key Management

    As enterprises rapidly broaden their use of encryption to protect sensitive information, the management of encryption keys has taken on new importance. There has been explosive growth in the number of entities performing encryption, the number of encryption keys being generated, and the number of individual key management systems being...

    Provided By RSA Security

  • White Papers // Apr 2009

    Special RSA Online Fraud Report: What to Expect in 2009 and Beyond

    Online fraud is a non-stop threat to organizations around the globe, and cyber-criminals have no intention of slowing down the pace. In fact, they continue to improve their technology, launch increasingly sophisticated attacks, and use advanced social engineering techniques to dupe online users into falling for scams. Also, global conditions,...

    Provided By RSA Security

  • White Papers // Apr 2009

    Convenient Multi-Factor Authentication (MFA) for Web Portals & Enterprise Applications

    As the usage of online portals, SSL VPN applications, and Web Access Management (WAM) products continue to grow, so does the need for strong authentication to protect access to the information contained within them. Providing single-factor authentication, or password only protection, creates a significant security threat to organizations. Single-factor authentication...

    Provided By RSA Security

  • White Papers // Feb 2009

    The Role of Security in Trustworthy Cloud Computing

    Cloud computing promises to change the economics of the data center, but before sensitive and regulated data move into the public cloud, issues of security standards and compatibility must be addressed including strong authentication, delegated authorization, key management for encrypted data, data loss protections, and regulatory reporting. All are elements...

    Provided By RSA Security

  • Case Studies // Jan 2009

    Secure Soaring at Britannia Airways

    Britannia Airways, Luton, Bedfordshire, U.K is leading charter airline in the United Kingdom. Britannia briefs pilots, cabin crew and ground staff before each flight, covering everything from individual passengers with special needs to the latest bulletins from aviation officials. Britannia Airways RSASecurID two-factor authentication provides strong protection against unauthorized access...

    Provided By RSA Security

  • Case Studies // Jan 2009

    Employee HR Intranet Is Protected by Suite of RSA Security Solutions

    In a fast-paced financial services environment, employees need to be as efficient as possible. Waiting on crowded phone lines for information about 401(k) accounts, health insurance plans or vacation status obviously cut heavily into their productivity. An intranet that provided simple yet secure access would let employees quickly retrieve the...

    Provided By RSA Security

  • Case Studies // Jan 2009

    Secure Soaring at Britannia Airways

    Britannia Airways, Luton, Bedfordshire, U.K is leading charter airline in the United Kingdom. Britannia briefs pilots, cabin crew and ground staff before each flight, covering everything from individual passengers with special needs to the latest bulletins from aviation officials. Britannia Airways RSASecurID two-factor authentication provides strong protection against unauthorized access...

    Provided By RSA Security

  • Case Studies // Jan 2009

    Employee HR Intranet Is Protected by Suite of RSA Security Solutions

    In a fast-paced financial services environment, employees need to be as efficient as possible. Waiting on crowded phone lines for information about 401(k) accounts, health insurance plans or vacation status obviously cut heavily into their productivity. An intranet that provided simple yet secure access would let employees quickly retrieve the...

    Provided By RSA Security

  • Case Studies // Jan 2009

    Law Firm Protects Newly Built HQ With RSA Security's Smart Badging Solution

    Formed in 1968, Post & Schell has more than 150 lawyers in six offices - five in Pennsylvania and one in New Jersey. The challenge was to have a blank slate to build a security system; he also recognized the risk that if he made the system too difficult or...

    Provided By RSA Security

  • White Papers // Jun 2009

    Securing Sensitive Information With Identity and Access Assurance

    Identity and Access Management (IAM) is a combination of business and Information Technology (IT) practices designed to ensure that only the right people have the right access to the right resources and are doing the right things. While different organizations may place varying emphasis on different business drivers for implementing...

    Provided By RSA Security

  • White Papers // Apr 2009

    The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business

    This is a recurring question being asked by organizations around the globe. With the number of new and emerging security products being denoted by analysts as the "silver bullet" solution, it is critical to recognize that there are many authentication choices available on the market. Before making a final selection...

    Provided By RSA Security

  • White Papers // Apr 2009

    Case Study Whitepaper: Incorporating Data Loss Prevention into Daily Business Operations: How Microsoft® Did it

    Perhaps the biggest challenge facing organizations considering the implementation of a data loss prevention (DLP) solution is the daunting scope of the problem. Considering the volume of systems, data, employees and business processes potentially impacted, many CIOs, CISOs and CSOs struggle with identifying how and where to start. Implementing a...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA® Data Loss Prevention Suite: Uncover your risk, establish control

    RSA Data Loss Prevention (DLP) helps uncover business risk associated with the loss of sensitive data and dynamically lowers that risk through policy-based remediation and enforcement of controls. RSA DLP is designed to help mitigate this risk regardless of whether the data is at rest in a datacenter, moving as...

    Provided By RSA Security

  • White Papers // Apr 2009

    Magic Quadrant for Security Information and Event Management

    Funding for security information and event management(SIEM) technology deployments is driven in large part by the need to quickly address regulatory compliance issues, but most organizations also want to improve security monitoring capabilities. An optimal solution will support the real-time collection and analysis of log data from host systems, security...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA enVision® Platform Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures

    The job of Security Operations, whether a large organization with a dedicated staff and resources, or one person with multiple responsibilities, is to keep information assets secure by continually monitoring the organization's IT environment, anticipate and respond to immediate threats and long-term vulnerabilities, and provide advice and guidance on security...

    Provided By RSA Security

  • White Papers // Apr 2009

    Log Management Best Practices The Foundation for Comprehensive Security Information and Event Management

    Log (event) management is the collection, analysis (real-time or historical), storage and management of logs from a range of sources across the enterprise. It is the foundation for comprehensive security information and event management (SIEM). Organizations which develop best practices in log management will get timely analysis of their security...

    Provided By RSA Security

  • White Papers // Apr 2009

    Driving Fast and Forward: Managing Information Security for Strategic Advantage in a Tough Economy

    Enterprises worldwide face escalating economic uncertainty; yet at the same time, the forces of globalization and technology continue to offer tremendous opportunities. Navigating the road ahead will be challenging. It will require that enterprises use not only the power of business innovation but also the ability to manage risk for...

    Provided By RSA Security

  • White Papers // Apr 2009

    Developing a Sustainable and Cost Effective IT Compliance Program

    Complying with laws and regulations is an increasing burden for organizations, from the board of directors down to the trenches of business. Over the past ten years there has been a significant and growing impact of regulatory compliance specifically on the IT department. In a nutshell: business is complex and...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA® Solutions for Securing Critical Cyber Assets within Electric Utilities

    Today, electric utilities are faced with the ever-growing threat of cyber intrusion which poses a huge risk to businesses and power customers. While hackers have targeted electric utilities and have been the cause of multiple power outages globally, the problem is one that poses a particular threat to US &...

    Provided By RSA Security

  • White Papers // Apr 2009

    RSA PCI Solutions for Retail

    Accelerating PCI Compliance and Your Business - Discover cardholder data - Assess areas of non-compliance and prioritize remediation activities - Encrypt cardholder data from point-of-sale applications onward and manage encryption keys - Authenticate users and authorize access to cardholder data and related systems - Manage logs and ease the process...

    Provided By RSA Security

  • White Papers // Apr 2009

    Securing Customer Proprietary Network Information: The Telecommunication Carriers' Challenge

    According to the United States Federal Communications Commission (FCC), major security breaches between February 2005 and April 2007 resulted in the Customer Proprietary Network Information (CPNI) of over 54 million Americans to be compromised, including consumer call detail information, billing and other personally identifiable information (PII). These breaches represent a...

    Provided By RSA Security

  • White Papers // Sep 2008

    The Relationship Between ISO 27002 and the EU Data Protection Directive

    The regulatory landscape for Information Security in Europe has grown ever more complex in recent years. As organisations, both public and private, recognise the inherent value of their information, and as the safety and reliability of electronic communications become ever more central to the ways in which it interacts with...

    Provided By RSA Security

  • White Papers // Apr 2009

    6 Best Practices for Preventing Enterprise Data Loss

    Protecting a company from enterprise data loss is a strategic necessity. The risks, including potential monetary losses and damage to customer confidence and brand value, are far too great to ignore. But laying out a data security strategy and then implementing it is no easy feat. RSA, the leader in...

    Provided By RSA Security

  • White Papers // Aug 2009

    Security Compliance in a Virtual World: Best Practices to Build a Solid Foundation

    Over time, IT and security teams and external auditors will increase their knowledge and competencies in virtualization. IT and security teams should work closely with each other and their internal and external auditors in the design and implementation of virtual systems and educate them about the specific risk management methods...

    Provided By RSA Security

  • White Papers // May 2009

    Information-Centric Security for the Virtual Data Center

    Marrying the flexibility and agility of virtualization with the needs of the contemporary enterprise for information security, privacy and compliance demands that more intelligence and decision-making around security be embedded in the infrastructure itself. RSA's risk-based approach helps customers ensure security and compliance without sacrificing the operational flexibility and mobility...

    Provided By RSA Security

  • White Papers // May 2009

    Four Best Practices for Secure Web Access

    Securing web access is critical to protect against the threat of sensitive corporate data ending up in the wrong hands. As organizations extend access to more users and enable information sharing across more applications and systems, a secure web access strategy is essential. By following these best practices, organizations can...

    Provided By RSA Security

  • White Papers // Feb 2009

    The Role of Security in Trustworthy Cloud Computing

    Cloud computing promises to change the economics of the data center, but before sensitive and regulated data move into the public cloud, issues of security standards and compatibility must be addressed including strong authentication, delegated authorization, key management for encrypted data, data loss protections, and regulatory reporting. All are elements...

    Provided By RSA Security

  • White Papers // Jun 2009

    The Coming Storm of Regulation

    The continuing financial crisis that has gripped the world since mid-2008 is likely to cause a flood of new global regulations. The nature of this failure dictates a new approach to regulations that will drive transparency requirements and risk management adoption. Organizations throughout the world will need to effectively manage...

    Provided By RSA Security

  • White Papers // Sep 2009

    Securing Sensitive Data With Tokenization: An Emerging Technology

    Tokenization is an emerging technology for protecting sensitive information, based on the well-established technique of substitution. It provides significant advantages compared to traditional encryption and other technologies such as format-preserving encryption. Tokenization can reduce the scope of threats to sensitive information and ease the burden of compliance management. It can...

    Provided By RSA Security

  • White Papers // Sep 2009

    Information Security and Privacy in Emerging Economies: Implications for Global Competitiveness

    Commerce, collaboration and communication have, throughout time, been enabled or hampered by the environment of trust, security and privacy in which they occur. In an increasingly fluid, interconnected global community, the ways in which creates trust, ensure privacy and provide security must evolve, and must take advantage of available best...

    Provided By RSA Security

  • White Papers // Aug 2009

    Guidelines and Considerations for Securing Your Microsoft SharePoint Environment

    Microsoft SharePoint can be an extremely powerful tool for sharing and collaborating on information, providing a flexible, distributed approach to management and control. However, its very strengths can also lead to a wide range of security and compliance problems. By moving the responsibility for what gets stored in SharePoint and...

    Provided By RSA Security

  • White Papers // Apr 2009

    Microsoft SharePoint: Understanding and Addressing the Information Security Challenges

    The RSA enVision platform enables IT security professionals and compliance officers to bring SharePoint within the scope of their compliance mechanisms. RSA enVision log management collects logs from RSA Data Loss Prevention and correlates SharePoint server activity to the enterprise security context. The RSA enVision platform identifies anomalies and vulnerabilities...

    Provided By RSA Security

  • White Papers // Jun 2009

    Five Key Considerations for Selecting a Data Loss Prevention Solution

    Data loss prevention is about more than just preventing sensitive data from being lost or mishandled. If that were the case, organizations would block every single transmission and prevent every sensitive file from being accessed or handled. If every file were blocked or encrypted, it would impede immensely on employee...

    Provided By RSA Security

  • White Papers // Apr 2009

    Enterprise Key Management: Deploying a New Generation of Solutions for Enterprise Key Management

    As enterprises rapidly broaden their use of encryption to protect sensitive information, the management of encryption keys has taken on new importance. There has been explosive growth in the number of entities performing encryption, the number of encryption keys being generated, and the number of individual key management systems being...

    Provided By RSA Security

  • White Papers // May 2009

    ROI and SIEM: How the RSA enVision Platform Delivers an Industry-Leading ROI

    This paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. "SIEM ROI" depends on several factors, including a user's compliance and security obligations, the size and complexity of the IT environment and any current log management processes.

    Provided By RSA Security

  • White Papers // Jul 2007

    Log Management Best Practices: The Foundation for Comprehensive Security Information and Event Management

    Although best practices should be developed by each individual organization based on their particular environment, there are some general best practices which can be universally applied. This paper is intended to help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices...

    Provided By RSA Security

  • White Papers // Sep 2009

    Security in the Call Center: Verifying Customer Identities Without the Inconvenience

    Off late many organizations looking to reduce costs, increase efficiency, and provide more self-service options for their customers have driven sales and service to the online channel. While the Internet offers many advantages, the live interaction offered through the Call Center is still a preferred method for many customers looking...

    Provided By RSA Security

  • White Papers // Oct 2012

    Defending Against the Unknown Enemy: Applying FLIPIT to System Security

    Most cryptographic systems carry the basic assumption that entities are able to preserve the secrecy of their keys. With attacks today showing ever increasing sophistication, however, this tenet is eroding. "Advanced Persistent Threats" (APTs), for instance, leverage zero-day exploits and extensive system knowledge to achieve full compromise of cryptographic keys...

    Provided By RSA Security

  • Resource Center // Jun 2009

    Authentication Decision Tree Tool

    The RSA Authentication Decision Tree Tool is an interactive tool to help organizations understand, evaluate and select the most appropriate authentication solution to meet the needs of their users and their business. It provides a framework to help narrow the selection of authentication solutions based on five critical factors.

    Provided By RSA Security

  • White Papers // Apr 2009

    Actionable Relief for Those Caught in the Middle:RSA Addresses the PCI Challenges of Level 2 Businesses

    With up to 6 million payment card transactions per year in some cases, the enterprise defined as Level 2 for PCI compliance faces a perplexing dilemma. The Level 2 business carries a level of responsibility for PCI compliance similar to that of the Level 1 enterprise. At the same time,...

    Provided By RSA Security

  • White Papers // Apr 2009

    Whitepaper: Four Best Practices for Secure Web Access

    The Web has created a wealth of new opportunities - enabling organizations to reduce costs, increase efficiency and provide "anytime anywhere" access to corporate resources for employees, customers and partners. As organizations shift from an internal to external focus, the traditional view of identity and access management (IAM) is changing,...

    Provided By RSA Security

  • White Papers // Apr 2009

    Magic Quadrant for Web Fraud Detection

    Web fraud detection vendors are experiencing high sales-growth rates, driven by increasing cyberattacks in a weakened global economy. Larger security vendors are refocusing their efforts in this area, while smaller, low-cost competitors typically provide better customer service and more innovation.

    Provided By RSA Security

  • White Papers // Sep 2009

    Business Success in a Dark Market: An Inside Look at How the Fraud Underground Operates

    The business of online fraud has developed into a sophisticated underground criminal operation that continues to evolve everyday. Much like a real-world business, fraud "Entrepreneurs" offer products and services for a profit, they fight to gain competitive advantage and market share, are continually innovating to improve their offerings and meet...

    Provided By RSA Security

  • White Papers // Aug 2009

    Assuring User Identities During a Business Disruption: Applying a Consistent Strong Authentication Policy to Business Continuity Planning

    This white paper examines the importance of maintaining a consistent two-factor authentication policy during a business disruption. In addition, it provides insight into how to develop plans that enable cost-effective, rapid binding of users to their credentials in the event of an emergency - without lowering the security policy, opening...

    Provided By RSA Security

  • White Papers // Apr 2009

    Special RSA Online Fraud Report: What to Expect in 2009 and Beyond

    Online fraud is a non-stop threat to organizations around the globe, and cyber-criminals have no intention of slowing down the pace. In fact, they continue to improve their technology, launch increasingly sophisticated attacks, and use advanced social engineering techniques to dupe online users into falling for scams. Also, global conditions,...

    Provided By RSA Security

  • White Papers // Apr 2009

    Convenient Multi-Factor Authentication (MFA) for Web Portals & Enterprise Applications

    As the usage of online portals, SSL VPN applications, and Web Access Management (WAM) products continue to grow, so does the need for strong authentication to protect access to the information contained within them. Providing single-factor authentication, or password only protection, creates a significant security threat to organizations. Single-factor authentication...

    Provided By RSA Security