RSA Whitepapers


Sort by: Date | Company | Title


Removing the Target with Effective Authentication
By RSA | 6/11/2013

Any size organization can be a target, generally because of weak authentication. Password-only protection is simply too risky. In addition, stolen passwords were responsible for major thefts of records from Best Buy and Twitter. This paper will show why any size organization can be a target; and how the legal and threat environment—combined with BYOD and cost factors—make multi-factor, risk based authentication the logical approach to solving the problem.

Download this now


The Authentication Decision Tree
By RSA | 6/11/2013

With the number of new and emerging security products being denoted by analysts as the “silver bullet” solution, it is critical to recognize that there are many authentication choices available on the market. In this whitepaper, we look at what organisations must consider before making a final selection, specially their user authentication needs, the threats targeting their business, their business objectives and the regulatory guidelines that impact their industry.

Download this now


Magic Quadrant for User Authentication
By RSA | 6/11/2013

The user authentication market is dominated by well-established, wide-focus vendors. Newer wide- and tight-focus vendors continue to offer enterprises sound alternatives across a range of use cases. In this whitepaper, we look at the marketplace to compare how vendors compare in their completeness of vision and their ability to execute.

Download this now


When Advanced Persistent Threats go Mainstream - Building Information-Security Strategies to Combat Escalating Threats
By RSA | 14/11/2011

Inside this report: Key characteristics of APTs, how enterprises are making themselves vulnerable, new approaches to information security, and seven defensive measures against escalating threats.

Download this now


Enterprise Governance, Risk and Compliance: A New Paradigm to Meet New Demands
By RSA | 14/11/2011

In our increasingly globalised environment, economies and enterprises are steadily becoming interrelated. Yet many key functions and departments the deal with related information and business processes remain siloed. The answer is to bring governance, risk management and compliance together in an integrated program where policies, data and controls are strategically managed and visible throughout the enterprise.

Download this now


Managing Risk on the Journey to Virtualization and the Cloud
By RSA | 11/5/2011

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) highlights how the RSA Solution for Cloud Security and Compliance offers such an approach. Centered on the well-accepted RSA Archer eGRC platform and enVision® platform technologies for security and compliance information and event management.

Download this now


A Guide to Staying Secure Amidst Gorwing Threats and the Expanding Digital Universe
By RSA | 11/5/2011

Security management needs to evolve to protect business, government, and individuals from growing cyber threats. This Paper outlines challenges facing security executives and teams and uses an “air traffic control system” analogy to show how advanced security management systems can deliver better security by providing a single point of visibility and coordination for physical, virtual, and cloud assets. Solutions are presented where business processes, policy, controls, and data work in concert to achieve the vision of an air traffic control system for information security.

Download this now


Infrastructure Security: Getting to the Bottom of Compliance in the Cloud
By RSA | 11/5/2011

In cloud environments, one of the most pervasive and fundamental challenges for organizations in demonstrating policy compliance is proving that the physical and virtual infrastructure of the cloud can be trusted – particularly when those infrastructure components are owned and managed by external service providers. Read on.

Download this now

Essentials

Cygnett 2500 ChargeUp Pocket Lightning Portable Power Bank

Learn more >

Mobile

Exec

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?