The name of the base system (platform): | RSA SecurID Software Token |
Developers: | RSA (Security Division of EMC) |
Last Release Date: | March, 2013 |
Technology: | Cybersecurity - Authentication |
- Security management of Big Data. Computing powers, the sizes of bandwidth, capacity of storages and an ability to manage databases are very big today. However the means allowing to analyze all data sets to obtain information hidden in the most different contextual data — structured and unstructured, internal and external will be required for the organizations all the same. The organizations also need appropriate level of a context for formation of specific information on digital assets, users and systems. Architecture based on Big Data can and should be rather scalable to meet unique requirements of each organization. In that case the organizations will be able to trace and correlate abnormal patterns in behavior of users and transactions with a flow and use of data to reveal the potential attacks and cases of fraud.
- Development and use of means of protecting of Big Data. The organizations should master more complete approach to implementation of separate means of protecting of Big Data, instead of the means focused on accomplishment of separate tasks (for example, on blocking of malware). Separate means of protecting need to be finished that they could interact with channels of analytical data, platforms of risks assessment and ensuring compliance to requirements of regulators and safety management systems. Such interaction will raise possibilities of rapid response and readiness for unforeseen situations. Other means of protecting of Big Data focused on specific objectives should have self-training functions.
RSA Authentication Manager 8
EMC announced in February, 2013 release of the RSA Authentication Manager 8 platform which adds the new authentication mechanism on the basis of risks assessment functioning using analytics of Big Data to an arsenal of the organizations. As a result of the organization receive one more means for increase in level of control of identification in corporate, cloud and mobile environments.
The RSA Authentication Manager 8 platform connected technology of the one-time passwords RSA SecurID to authentication on the basis of risks assessment. The principle of work of Authentication Manager is based on what is imperceptible for users the platform analyzes tens of risk factors for check and authorization of access to corporate and cloud resources, without reducing convenience of work of employees or performance.
This solution differs in lower total cost of ownership, allows to simplify administration and is compatible to all equipment rooms, software and mobile tools of authentication of RSA SecurID unrolled and used at customers at the moment.
IT infrastructures are more and more fragmented, including cloud applicaions and mobile devices. As a result of border of corporate networks are blurred: now even corporate users need simple and transparent access to applications and information irrespective of the fact which they use devices. So sharp technology jumps conduct to the fact that the organizations face unprecedented risks at identification of users.
The RSA Authentication Manager 8 platform is intended for transparent assessment and confirmation of identification these users on the basis of risks assessment. The procedure of an input of users in a system remains fast, simple and usual while the module of risks assessment of RSA with self-training functions in the background executes checks, necessary for authentication, at which for security of each user session a number of risk factors is considered.
Thanks to analytics of Big Data the RSA Authentication Manager 8 platform provides higher transparency of the risks connected with access control. It is reached due to creation of expanded user profiles on the basis of these devices and behavioural characteristics. Profiles, in turn, are used for detection and permission of normal behavior and for identification and blocking of abnormal activity. RSA Authentication Manager 8 automatically executes checks for access control in which tens of unique risk factors are considered. Thereby reliable access control which opportunities much more exceed two-factor or three-factor autonomous authentication that gives to the enterprises the chance to increase the level of check of identification without decline in production and creation of inconveniences for users is provided. Having received the analytical tool capable to consider more than 100 risk factors in almost infinite number of combinations, the organizations will be able to estimate better trust and risk on the basis of activity of users and to set the acceptable level of the certificate of authentication on the basis of the specific range of validity of risk.
The RSA Authentication Manager 8 platform provides the following advantages:
- Protection against threats to the increased complexity. Using the approach to security based on analytical data RSA Authentication Manager detects unauthorized access and abnormal activity, and the risks assessment module with functions of self-training provides protection against the current, new and future threats to the increased complexity.
- Decrease in total cost of ownership and improvement of controllability. The built-in functions (including an expanded panel of the administrator and a self-service portal) allow to reduce the number of addresses to a support service and at the same time to unload IT department as they automatically carry out many labor-consuming and expensive tasks which are carried out at deployment of a traditional corporate system of authentication. Besides, the RSA Authentication Manager 8 platform includes functions of the protected creation of program markers thanks to what confidential information on markers and users can be created dynamically without transfer via the Internet.
- Flexible opportunities of the choice. Authentication on the basis of risks assessment can be unrolled together with hardware, software or special tools of authentication of RSA SecurID. This system allows to expand the range of applications and users significantly: for example, using Authentication Manager it is possible to cover temporary employees, contractors and partners whose inclusion in the system of strict authentication was considered as too expensive and labor-consuming earlier.
- Convenience to end users. Transparent increase in security without decrease in convenience of users is reached due to preserving of the traditional procedure of login (with input of a user name and the password) and accomplishment of risks assessment, imperceptible for the user, in the background.
Besides, the RSA Authentication Manager 8 platform will be available in the form of VMware Virtual Appliance that will help the organizations to use the potential of virtual environments due to optimization of deployment, administration and the current systems management.
The RSA Authentication Manager 8 platform is the base on which the solutions RSA for adaptive identification and access control are constructed. In it the same module of risks assessment, as in RSA Adaptive Authentication providing at the moment protection of accounts of more than 350 million users is used. Possibilities of this module are connected to RSA SecurID technology therefore the solution having the flexibility and reliability sufficient for compliance to requirements of any enterprise was received. In combination with RSA Access Manager and the federirovanny solutions RSA the RSA Authentication Manager platform can be adapted for any corporate systems and cases of use of cloud computing.