RSA Releases Three Security Solutions

By

New identity management tools offer improved cloud integration.

RSA has announced three new solutions within its Identity and Access Management (IAM) suite. According to the company, these solutions are engineered to create a dynamic perimeter around online user sessions, selectively and securely provide identity information to cloud applications and partners, and establish faster identity federation with cloud applications.

The new RSA Access Manager aims to provide secure access to web applications through web single sign-on, consolidate access controls for enhanced security, and accelerate application deployment. It supports a broad range of authentication methods, including integration with RSA Adaptive Authentication for out-of-band phone and the new support for out-of-band email risk-based authentication.

The RSA Adaptive Directory correlates and aggregates identity information across enterprise sources and delivers a global view of identity using a flexible, scalable identity virtualization layer. 

The RSA Adaptive Federation solution provides secure identity federation as a service to ensure appropriate access to resources and data in SaaS applications. RSA Adaptive Federation, which is powered by VMware Horizon Application Manager, allows secure access to and from the cloud while lowering deployment and operating expenses associated with internally hosted products. The solution eliminates the need for employees to remember sign-on credentials for each cloud application and allows them to securely use any browser-enabled device for access to cloud applications. According to the announcement, RSA Adaptive Federation is designed to interoperate with Microsoft Windows operating systems and RSA SecurID authentication already deployed at organizations.

For more information, please visit: http://www.emc.com/domains/rsa/index.htm.

09/20/2012

Related content

  • Identity Management from the cloud
    Offers for identity management as a service (IDaaS) are entering the market and promising simplicity. However, many lack functionality, adaptability, and in-depth integration with existing systems. We look at how IT managers should consider IDaaS in their strategy.
  • Recovering from a cyberattack in a hybrid environment
    Restoring identity is an important part of disaster recovery, since it lays the foundation for restoring normality and regular operations. We look into contingency measures for hybrid directory services with Entra ID, the Graph API, and its PowerShell implementation.
  • IAM for midmarket companies
    We look at the role of identity and access management in midmarket organizations.
  • Public key infrastructure in the cloud
    A public key infrastructure in the cloud for secure digital communication maintains the security of an on-premises solution and reduces complexity.
  • Identity and access management with OpenIAM
    Identity and access management plays a central role in modern IT infrastructures, with its local resources, numerous applications, and cloud services. We investigate how OpenIAM implements centralized user management.
comments powered by Disqus