SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Similar documents
WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

IDENTITY: A KEY ELEMENT OF BUSINESS-DRIVEN SECURITY

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

MITIGATE CYBER ATTACK RISK

Crash course in Azure Active Directory

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Cisco Start. IT solutions designed to propel your business

Best Practices in Securing a Multicloud World

Next Generation Authentication

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Integrated Access Management Solutions. Access Televentures

FOR FINANCIAL SERVICES ORGANIZATIONS

GDPR How we can help. Solvit Networks CA. ALL RIGHTS RESERVED.

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Quick Heal Mobile Device Management. Available on

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

McAfee epolicy Orchestrator

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

IBM Security Access Manager

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Go mobile. Stay in control.

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

Securing Digital Transformation

Secure Access for Microsoft Office 365 & SaaS Applications

Identity Management as a Service

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

How Next Generation Trusted Identities Can Help Transform Your Business

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

The Etihad Journey to a Secure Cloud

How Identity as a Service Makes UCaaS/SaaS Integrations More Scalable, Productive, and Secure

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

ForeScout Extended Module for Splunk

Compliance with CloudCheckr

WEBMETHODS AGILITY FOR THE DIGITAL ENTERPRISE WEBMETHODS. What you can expect from webmethods

Maximize your move to Microsoft in the cloud

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and

CloudSOC and Security.cloud for Microsoft Office 365

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY

SIEM Solutions from McAfee

Centrify for Dropbox Deployment Guide

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

Next Generation Privilege Identity Management

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Make security part of your client systems refresh

SOLUTION BRIEF RSA NETWITNESS PLATFORM ACCELERATED THREAT DETECTION & AUTOMATED RESPONSE FROM THE ENDPOINT TO THE CLOUD

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Governance, Risk, and Compliance: A Practical Guide to Points of Entry

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

1 Introduction to Identity Management. 2 Access needs evolve. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

McAfee Skyhigh Security Cloud for Amazon Web Services

Sustainable Security Operations

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Dissecting NIST Digital Identity Guidelines

Solution. Imagine... a New World of Authentication.

AKAMAI CLOUD SECURITY SOLUTIONS

Oracle API Platform Cloud Service

Choosing the right two-factor authentication solution for healthcare

Cloud Customer Architecture for Securing Workloads on Cloud Services

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

white paper SMS Authentication: 10 Things to Know Before You Buy

I D C T E C H N O L O G Y S P O T L I G H T

Yubico with Centrify for Mac - Deployment Guide

Partner Center: Secure application model

Securing Your Most Sensitive Data

Identity & Access Management

INTELLIGENCE DRIVEN GRC FOR SECURITY

AS emas emudhra Authentication Solution

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP

the SWIFT Customer Security

THE IDENTITY DEFINED SECURITY ALLIANCE

Transcription:

RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility through secure access. Accelerate secure user access to applications by providing a seamless and convenient user experience with modern authentication options when additional authentication is required. Reduce identity risks by eliminating inappropriate access. Empower business users to make smart, informed and timely access decisions. Enable visibility and control across all access use cases, ground to cloud, to provide a holistic identity solution. To manage risk effectively in an expanding attack surface, Identity and Access Assurance is critical. That s the confidence that users accessing applications and data are who they claim to be, have the right level of access and have access that s current with business requirements. 2 SECURITY AND CONTROL TO MANAGE IDENTITY RISK CONVENIENT ACCESS TO EMPOWER TODAY S USERS With your organization serving a growing and diverse user population inside and outside of the company, you need to control access to systems, applications and data that exist both on-premises and in the cloud. Cloud, mobile and the internet of things (IoT) are opening up more avenues for people in your organization to connect with each other and with key resources, which boosts collaboration and productivity. This digital transformation, however, also presents an increasing threat surface and more vectors for cyber attackers to find their way into your critical applications and sensitive information. Identity has become one of the most consequential attack vectors to the modern enterprise. Last year, 81% of confirmed breaches to organizations infrastructure, sensitive data or applications started with an identity takeover. 1 At the same time, organizations face increasing governance and compliance requirements and may face hefty penalties for violations. In addition, users expect a mobile, convenient user experience to get their jobs done, and the lines of business are quick to adopt new SaaS applications to enable business agility. SECURE ACCESS TRANSFORMED RSA SecurID Suite enables your organization to accelerate business while mitigating identity risk and ensuring compliance. To address today s toughest security challenges of delivering access to a dynamic and modern workforce across complex environments, the RSA SecurID Suite transforms secure access to be convenient, intelligent and pervasive across all access use cases. CONVENIENT Today s users expect fast, convenient access to the data and applications they need to do their jobs. At the same time, IT needs an easy and effective way to protect anywhere-anytime-any device access to these assets that reside onpremises or in the cloud. As a result, access controls must be secure, convenient and easy to deploy. Easy for your business users Your users need to access applications and information with minimal friction. Additional authentication should be used only when required. When additional authentication is needed, users should have a broad variety of modern, convenient multi-factor authentication options that provide stronger authentication for a variety of access cases and diverse set of users including employees, contractors, help desk, partners and customers. Another key element of convenience is empowering business users to make access and authentication decisions and react to risky situations with a simple-to-use interface. 1 Source: Verizon 2017 Data Breach Investigations Report

Easy for your IT staff It is important to make secure access deployment and management convenient for IT so they can respond rapidly to business needs and strengthen and extend access-compliant protection across traditional, web, mobile and SaaS applications: Flexible deployment options, with the ability to respond to business needs quickly through easy onboarding of new applications Quick configuration options to optimize access decisions to respond to changing business needs and regulatory requirements INTELLIGENT Intelligent authentication provides the benefit of reducing friction and adding security to protect applications and data that are critical to the business. It provides both security and convenience, and takes into account the needs of the modern workforce. The intelligent approach to authentication considers the business context, or the impact of rogue access to an application on the business, to determine the policy or the required level of confidence needed to provide access to the application. Identity assurance enables the organization to have confidence that users are who they claim to be. That assurance is evaluated at the time of access based on what the organization already knows about the user (e.g., a known device, user login information) as well as any risk indicators (e.g., login from a new location). Together, these determine a current level of confidence and drive the required levels of authentication to provide the appropriate level of identity assurance. BUSINESS CONTEXT CONFIDENCE THAT THE USER IS WHO THEY CLAIM TO BE What is the business impact of rogue access to this application? Identity insights Threat intelligence What is the required confidence level to access? Low or high confidence REQUIRED AUTHENTICATION FOR THE RIGHT LEVEL OF IDENTITY ASSURANCE 3 Intelligent access When it comes to access control, the driver traditionally has been IT efficiency and streamlined provisioning of access to applications. But as organizations move to mobile and cloud technologies, it is critical to first gain a perspective on identity risk (for instance, the organization s current state of access, and how to stop inappropriate/unauthorized access). To minimize access risk of an application or data, an intelligent approach to access decisions considers the business context and impact of rogue access to an application on the business, in addition to evaluating current risk based on a set of defined criteria (e.g., number of orphaned accounts and overprivileged users).

BUSINESS CONTEXT EVALUATE CURRENT ACCESS RISK What is the business impact of rogue access to this application? How important is it to assess access violations to this application? Orphaned Accounts Over privilege Outlier access based on peer analytics PRIORITIZED ACCESS DECISIONS TO DRIVE ACCESS ASSURANCE The combined intelligent perspective and risk-based approach enable the organization to prioritize access decisions based on what matters most and to drive the right levels of identity assurance the confidence that the right people have access and access assurance the confidence that the access is appropriate for the user s role/job and that the access is in compliance with corporate and regulatory policies. PERVASIVE Finally, a holistic identity solution needs to be pervasive and cover all access use cases. If a solution is good only for protecting a SaaS application or only an on-premises application and is not holistic across all use cases, an organization cannot achieve true identity and access assurance. The reality is that with multiple sources of applications and data, user stores and identities will be scattered and decentralized. The goal is to connect to all of these islands of identity for unified visibility and control across all the access use cases. By connecting to all applications, knowing who has access and having confidence that users are who they say they are at the time of access, organizations can apply a holistic approach to addressing the identity challenges of digital transformation. With risk-based, multi-factor authentication, intelligent identity governance, and automated user lifecycle management, RSA delivers unprecedented identity and access assurance across all of your islands of identity from ground to cloud. CONVENIENT, SECURE ACCESS FOR THE MODERN WORKFORCE FROM GROUND TO CLOUD RSA SecurID Suite consists of two solutions that work together to address the security challenges of delivering access to a dynamic user population across complex environments. 4

Identity Governance Act with insight to prioritize access decisions Access & SSO Connect to any resource on-premises or in the cloud Access Assurance Who has access to what? Identity Assurance Is the user who they claim to be? Identity Lifecycle Ensure users have timely access the the right applications Authentication Provide convenient & secure access for all your users RSA SECURID ACCESS RSA SecurID Access enables organizations to empower employees, partners, contractors and customers to do more without compromising security or convenience. RSA SecurID Access ensures that users have timely access to the applications they need from any device, anywhere and ensures that users are who they say they are. RSA SecurID Access provides these benefits with the following capabilities: Pervasive Visibility and Control Your users need access to a wide variety of on-premises, cloud, SaaS and mobile applications. And you need the ability to make that access secure and to do so relatively quickly so people don t start doing their own thing, causing shadow IT. With RSA SecurID Access, you can quickly onboard new applications using wizard-based connectors that leverage leading integration standards such as SAML, password vaulting and RADIUS. Or you can reuse an existing integration via the RSA Ready program. RSA s dedicated team of partner engineers works with hundreds of leading technology vendors to document, certify and support the integration of RSA SecurID Access multi-factor authentication giving you the peace of mind you need and at the speed the business needs it. Modern Multi-Factor Authentication RSA SecurID Access offers a wide range of authentication options to support the needs of the modern workforce. Options range from the well-known RSA hardware and software tokens, to mobile-enabled push notification, one time passcode (OTP) and biometric fingerprint and face as well as SMS and FIDO tokens. Users can choose which authentication methods are most convenient for them, ensuring that they will always have access while minimizing help desk calls and emergency access requests. 5

Pervasive MFA Certified and supported Risk-based Authentication Access in context MACHINE LEARNING RISK PASS RISKY DENY Role Device Location Behavior App Push Mobile OTP Biometrics Text Msg Voice Call Low Medium High Risk HW Token SW Token FIDO Proximity Wearables Security Modern MFA Methods Easy & convenient Assurance Levels Challenge according to the level of risk RSA IDENTITY GOVERNANCE AND LIFECYCLE Prioritizes actions based on risk so that business-critical access violations are taken care of first Reduces time and manual effort with automated processes for access certifications and account lifecycle management Strengthens risk posture by having a clear picture of access violations and visibility into access Reduces chances of audit failure or breach by continually promoting resolution of risky access situations Reduces TCO with automated process and quick time to value 6 Risk-based Authentication RSA SecurID Access provides risk-based authentication powered by machine-learning algorithms. The risk engine takes into account information about the user access, device, applications and behavior, and provides the confidence that users are who they claim to be based on comparing the current access request with the history of the user. This enables a frictionless user experience when the confidence is high, or prompts additional authentication and enhanced security layered on top of the MFA options. Assurance Levels The RSA solution balances security and convenience by setting up authentication policies intuitively based on low, medium and high levels of risk. Low-risk scenarios need low levels of assurance, while higherrisk instances may require different, more secure types of access controls. RSA IDENTITY GOVERNANCE AND LIFECYCLE RSA Identity Governance and Lifecycle delivers continuous access assurance for organizations to help ensure that users across the organization have the proper level of access. By providing visibility across your islands of identity in today s blended cloud and on-premises environment, RSA Identity Governance and Lifecycle empowers business users to take action quickly and easily to address risky access situations with the highest business impact in order to reduce business risk and ensure compliance. RSA Identity Governance and Lifecycle takes a governance-first approach to manage identity risk and ensure that the security posture of the organization is intact with regard to user access. This is accomplished by automating access review and certification processes for greater operational efficiency, cost and time savings, and by flagging issues between formal review campaigns. In addition, access certification responsibility and accountability are transferred to the people who understand access needs best the business. Business-driven certification discourages access approval rubber stamping. Business users are provided with prioritized access issues based on risk informed by intelligence so they are empowered to take action with insight on what matters most. RSA Identity Governance and Lifecycle enables you to implement security and compliance controls (e.g., segregation of duties, unauthorized access permissions) to ensure policy and control objectives are met continuously.

To ensure users quickly gain access to the applications they need, RSA Identity Governance and Lifecycle provides the ability to grant access based on user roles and well-defined processes that enable the manager to provide access in a user-friendly way. It also manages entitlements (joiners, movers and leavers) across applications to ensure access stays current with users roles and that there is no overprivilege. The entire process of access request, approval and provisioning is automated using business-friendly language for approvals in order to ensure that users obtain appropriate access quickly. Ease of Use and Scalability In order to respond to ever-changing business needs and a dynamic threat landscape, RSA Identity Governance and Lifecycle provides security teams with the ability to configure and update policies, processes and controls quickly with point-and-click configuration tools that do not require customization and that provide quick time-to-value. In addition, high scalability allows your business to grow without needing to worry about the system, a critical factor given the number of applications and identities involved in business processes. Quick Starts and Blueprints To ensure that your organization is managing identity risk effectively, we have recently introduced best practices and blueprints to provide a set of use cases and recommendations to allow you to speed your time-to-deployment and time-to-value. RSA IDENTITY GOVERNANCE & LIFECYCLE CAPABILITIES Governance-first Approach Lifecycle Management & Automation Fully automate monitoring, reporting, certification and entitlement remediation Prioritized risk-based access certifications Visibility and control of access to unstructured data resources Policy, security and compliance controls definition and quantification Role mining, modeling, definition and certification Access request, approval, and provisioning process automation Business-friendly user access request and approval experience Joiner, Mover and Leaver (JML) processes enforcement aligned to policies Point and click configuration-based tools Highly scalable data model to manage millions of entitlements Flexible deployment options Best practices for implementing governance and/or lifecycle Quicker implementation reducing time to value Blueprints for key use cases and ecosystem integrations Ease of Use & Scalability Quick Starts & Blueprints For more information visit rsa.com/iam. The information in this publication is provided as is. Dell Inc. or its subsidiaries make no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying and distribution of any software described in this publication requires an applicable software license. 7 2018 Dell Inc. or its subsidiaries. All rights reserved. RSA and the RSA logo, are registered trademarks or trademarks of Dell Inc. or its subsidiaries in the United States and other countries. All other trademarks are the property of their respective owners. RSA believes the information in this document is accurate. The information is subject to change without notice. 07/18, Solution Brief, H17313 W139449.