RSA Identity Management systems // IT Management Solutions

RSA Identity Management systems

Luiza AguiarTraditional Identity and Access Management (IAM) systems are under enormous stress in large part due to the rampant use of mobile devices, software-as-a-service and the exponential growth in digital identities. Enterprises desperately seek a higher level of identity assurance to verify and authorize end user access to web and cloud-based applications. RSA’s vision for addressing this complex issue is embodied in a new RSA technology brief released this week called “Adaptive IAM: Defending the Borderless Enterprise”. The race is on, and the realization of this vision is expressed, in part, through new product integrations within RSA’s IAM solution portfolio.

Marrying Risk Analytics & Strong Access Controls

While the vision is certainly a journey, RSA’s IAM portfolio is evolving to help customers get started on the right foot and foundation. A critical initial step is having risk analytics tied to strong access controls protecting enterprise applications. Toward that end, RSA Access Manager 6.2, which is engineered to centrally manages authentication and authorization policies for access to web portals and applications, is now integrated with our flagship RSA Authentication Manger 8 software, the brains behind RSA SecurID technology.

To provide additional options for securing web access with risk analytics, RSA also continues to deepen integration between RSA Adaptive Authentication and RSA Access Manager. RSA Access Manager 6.2 adds new integration with RSA Adaptive Authentication’s out-of-band SMS, in addition to existing out-of-band email and out-of-band phone authentication methods.RSA Adaptive IAM Journey This version of RSA Access Manager also introduces extended support for Microsoft SharePoint 2010 claims-based authentication, which optimizes secure partner collaboration across portals and includes secure token service.

Creating Rich User Profiles

The second step toward Adaptive IAM is aggregating and synchronizing user profile data from across the existing identity infrastructure into one single source of identity truth for each user. Recently released RSA Adaptive Directory 6.1 delivers one virtual view of all users and entitlements, and now incorporates identity data stores in cloud-based applications as well as on-premise identity infrastructure including LDAP directories, Active Directory and databases. RSA Adaptive Directory 6.1 includes support for cloud-based identity data stores including those in Microsoft SharePoint, Salesforce, Google Apps, Office 365, Concur and Workday.

See also:

You might also like

It's not a foil-hat theory. Sorry.

by Snarky_McAssbag

Read. Learn.
Wealthy U.S. taxpayers, concerned about an Internal Revenue Service crackdown on the use of secret overseas bank accounts as tax havens, are rushing to meet a Thursday deadline to disclose those accounts or face possible criminal prosecution. The concern was triggered this summer when Switzerland's largest bank, caught up in an international tax evasion dispute, said it would disclose the names of more than 4,000 of its U.S. account holders.
The decision shattered a long-held belief that Swiss banks would guard the identities of its American customers as carefully as they did their money, and it raised concern that other international tax havens might be next

Brokers use names of 9/ 11 victims to woo invest

by undecidedstill

Brokers use names of Sept. 11 victims in wooing foreign investors
St. Louis Post-Dispatch
By Christopher Carey
ST. LOUIS _ Rogue brokers targeting foreign buyers of U.S. stocks have added a macabre twist: Their aliases are derived from victims of the Sept. 11, 2001, terrorist attacks.
Nearly all 22 executives and account managers listed on the Internet site for Bailey & Bennett Mergers and Acquisitions Inc. are actual or scrambled names of people who died in the World Trade Center, the Pentagon or on the four airliners the terrorists hijacked and crashed.
Representatives of Bailey & Bennett have been calling investors in the United Kingdom in recent weeks, offering to buy back worthless shares of obscure U

Springer Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International ... Computer Science / Security and Cryptology)
Book (Springer)
  • Used Book in Good Condition

Senate panel OKs $51 billion for Commerce, Justice, Science  — FCW.com
One sticking point is the House's desire to limit funding for the National Strategy for Trusted Identities in Cyberspace, a plan designed to come up with a new system for managing identities online.

Springer Public Key Cryptography - PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, ... Computer Science / Security and Cryptology)
Book (Springer)
  • Used Book in Good Condition
Springer Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, ... (Lecture Notes in Computer Science)
Book (Springer)
  • Used Book in Good Condition
Springer Information Security Practice and Experience: Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Lecture Notes in Computer Science / Security and Cryptology)
Book (Springer)
Springer Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings (Lecture Notes in Computer Science / Security and Cryptology)
Book (Springer)

Related Posts



Copyright © . All Rights Reserved