RSA Releases Three Security Solutions

By

New identity management tools offer improved cloud integration.

RSA has announced three new solutions within its Identity and Access Management (IAM) suite. According to the company, these solutions are engineered to create a dynamic perimeter around online user sessions, selectively and securely provide identity information to cloud applications and partners, and establish faster identity federation with cloud applications.

The new RSA Access Manager aims to provide secure access to web applications through web single sign-on, consolidate access controls for enhanced security, and accelerate application deployment. It supports a broad range of authentication methods, including integration with RSA Adaptive Authentication for out-of-band phone and the new support for out-of-band email risk-based authentication.

The RSA Adaptive Directory correlates and aggregates identity information across enterprise sources and delivers a global view of identity using a flexible, scalable identity virtualization layer. 

The RSA Adaptive Federation solution provides secure identity federation as a service to ensure appropriate access to resources and data in SaaS applications. RSA Adaptive Federation, which is powered by VMware Horizon Application Manager, allows secure access to and from the cloud while lowering deployment and operating expenses associated with internally hosted products. The solution eliminates the need for employees to remember sign-on credentials for each cloud application and allows them to securely use any browser-enabled device for access to cloud applications. According to the announcement, RSA Adaptive Federation is designed to interoperate with Microsoft Windows operating systems and RSA SecurID authentication already deployed at organizations.

For more information, please visit: http://www.emc.com/domains/rsa/index.htm.

09/20/2012

Related content

  • Identity Management from the cloud
    Offers for identity management as a service (IDaaS) are entering the market and promising simplicity. However, many lack functionality, adaptability, and in-depth integration with existing systems. We look at how IT managers should consider IDaaS in their strategy.
  • Identity and access management with OpenIAM
    Identity and access management plays a central role in modern IT infrastructures, with its local resources, numerous applications, and cloud services. We investigate how OpenIAM implements centralized user management.
  • Hardware MFA: Death to the password!
    Around since the 1960s, passwords are still the mainstay for authentication. The good news is you have alternatives in hardware multifactor authentication.
  • Automate the Active Directory Federation Services install
    Installing Active Directory Federation Services is complex and involves several GUIs. For admins entrusted with building a farm, repetitive clicking in various management consoles can become an annoying and error-prone process. The call for automation is loud.
  • Avoiding KVM configuration errors
    Virtualization solutions isolate their VM systems far more effectively than a container host isolates its guests. However, implementation weaknesses in the hypervisor and configuration errors can lead to residual risk, as we show, using KVM as an example.
comments powered by Disqus