Sei sulla pagina 1di 18

REIMAGINE YOUR

IDENTITY STRATEGY
WITH ®
RSA SECURID SUITE
Accelerate business while
mitigating identity risk

C
1O N F I D E N T I A L
AGENDA
Today’s critical security challenge
Reimagine your identity strategy
What others say
Business-Driven Security™

2
THE CRITICAL
CHALLENGE FOR
TODAY’S MODERN
ORGANIZATION

3
O R G A N I Z AT I O N S A R E S T R U G G L I N G TO P R O T E C T
THEIR USER IDENTITIES

73% 75% 81%


of breaches were FINANCIALLY perpetrated by of Web attacks
motivated OUTSIDERS leveraged either stolen +/or
weak PASSWORDS*

4 * Source: Verizon Data Breach Investigations Report, 2017


Cloud adoption creates islands of identity
and smart devices change the game
How and by whom?

Impossible
to centrally
manage/control

Islands of identity Mobile changes how users


create new credentials interact with applications and
to be approved, data; expect access
managed and certified from anywhere

Is access appropriate
throughout the
user’s lifecycle?

Islands create gaps in visibility and introduce How do you ensure it is secure?
security and compliance risks

5
TRADITIONAL IT CONTROLS ARE NO LONGER
EFFECTIVE

Vanishing 3rd Party Access SaaS Passwords Compliance Failure


Perimeter

The perimeter is How are How to manage How can you strengthen Manual access
difficult to define non-employees identities? authentication to meet governance and
(if not gone) given access? today’s threats? provisioning processes
How it is reviewed increase security and
or tracked? compliance risks
(costly)

---creating lack of control and visibility


6
M O D E R N O R G A N I Z AT I O N S S T R U G G L E TO A S S E S S
AND ACT
• Are users who
they say they are?

• Do users have
! the right access?
! ! !
! • Does user access
! ! meet compliance and
! ! governance
! ! ! requirements?
! ! • Do you know who has
! access to what and
who approved it?
How can you
• Are you effectively be sure?
managing the
identity lifecycle?
7
WHAT’S NEEDED TO
REIMAGINE YOUR
IDENTITY STRATEGY?

8
TECHNOLOGY THAT PROVIDES

Full visibility
Who has access to what…and how did they receive it?

Context and risk insight


How easily do you attain and maintain compliance, and make real-
time access authentication decisions??

Efficient, continuous assurance


How quickly can you detect and remediate access violations and
unauthorized changes while delivering convenient access to your users?

Business agility
Is your security posture aligned with the needs of the business that
allows them to grow while maintaining compliance?
9
RSA SecurID Suite delivers identity and
access assurance
Centralized Ability to assess and Complete protection from
visibility leverage risk and context access to provisioning

Identity and access assurance


10
RSA SecurID Suite
Accelerate your business while mitigating identity risk
Enable the business while
minimizing the attack surface
Access assurance
Who has access to what?

Centralized visibility into


user access Provide convenient & secure
across all applications access for all your users

Connect to any resource Identity assurance


on-premises or in the cloud Is the user who they
claim to be?
11
RSA SecurID® Access
Delivering convenient and secure access to the modern workforce

RSA SecurID Access features RSA SecurID Access benefits

• Leading risk analytics and • Ensures right individuals have


context-based awareness convenient and secure access
• Advanced multi-factor • Meets the authentication
authenticators requirements of the modern
• Central, automated workforce
management • Protects identities wherever they
• Easy application are
interoperability • Reduces startup times and
lowers costs

12
RSA® Identity Governance and Lifecycle
Manage and provide insight into who has access to what

RSA Identity Governance and RSA Identity Governance and


Lifecycle features Lifecycle benefits

• Simplified access governance • Gain visibility to ‘who has access


• Streamlined access request and to what’
fulfillment • Empower the business
• ‘Identity’ as an enterprise risk • Reduce identity and compliance
control risks
• Point and click configuration • Achieve a sustainable IAM
program

13
•A single, unified platform for all your identity needs

•Convenient, secure access

•Full visibility into and centralized control across identity silos

•Risk and context insight for smart access decisions

THE RSA •Ability to protect what matters most in the cloud


SECURID and on-premises
SUITE GIVES
YOU…

14
What our customers and analysts say
RSA SecurID Access For a highly regulated organization like ours, it made sense to choose the
solution that gives us both the performance and scalability benefits of
SaaS and the security of on-premise.
–Kyle Welsh,
25,000+
customers 50% Authentication
market share Chief Information Security Officer
BECU

500+ Winner of 2017 SC


With RSA Identity Governance and Lifecycle, we’re much better at
certified Magazine ‘Best Multifactor
Authentication Solution’ defining applications and application roles, which enables us to do
technology provisioning and de-provisioning much more efficiently. It doesn’t
partners Winner 2015, 2016, & 2017 take a whole week now to set an application up and have it available
on the system; we can do it all in a day.
–Mike Duncan
Pioneer and market leader in enterprise Program Manager for IAM
multi-factor authentication Ameritas Life Insurance Corp.

RSA Identity Governance and Lifecycle RSA's mix of full IGA functionality and integrations with both SaaS
and legacy on-premises applications make it a good fit for both the
workforce to SaaS and traditional/legacy workforce use cases.
–Gartner,
‘Leader’ in 2016 Forrester Wave: #1 IGA vendor for Small/Medium “Critical Capabilities for Identity and Access
Identity Management and Business in Gartner IGA 2016 Management as a Service, Worldwide” (Sept 2016)
Governance Report Critical Capabilities Report

15
Reimagine your identity strategy with the
RSA SecurID Suite

Ensure users are who Provide appropriate system Accelerate business agility
they say they are and application access and digital transformation

Convenient, secure access


in a world with no boundaries
16
RSA has the complete solution
RSA’s complete portfolio of Business-Driven Security solutions that allow organizations to take command of their
evolving security posture in this uncertain, high-risk world.

RSA ARCHER® SUITE

RSA RSA
NETWITNESS® ENGINE SECURID
SUITE SUITE

CONTEXTUAL INTELLIGENCE

17 Right picture Power & speed Business context Right actions


Of insight
THANK
YOU
Your Name
your email@rsa.com

18

Potrebbero piacerti anche