RSA bolsters IAM solution with security enhancements

News by SC Staff

RSA has added new functions to its Identity and Access Management (IAM) suite to include extra security in hybrid IT environments.

RSA has added new functions to its Identity and Access Management (IAM) suite to include extra security in hybrid IT environments.

According to the company, the solutions are designed to address evolving security challenges that require new ways to manage and protect the growing number of users and device identities, as well as the exponential growth in identity information and the need to help ensure consistent security across enterprise, cloud and mobile infrastructures.

These include the RSA Access Manager, which provides secure access to web applications through web single sign-on (SSO) and the ability to consolidate access controls. The company also said that Access Manager is designed to support a broad range of authentication methods, including tight integration with RSA Adaptive Authentication for out-of-band phone and the new support for out-of-band email risk-based authentication.

In the adaptive sector, the company has launched RSA Adaptive Directory which is engineered to correlate and aggregate identity information across a variety of enterprise sources, RSA said.

RSA Adaptive Federation is designed to provide secure identity federation-as-a-service to be certain that the right users have the right access at the right time to business-critical resources and sensitive data in SaaS applications.

Dan Schiappa, senior vice president of the identity and data protection group at RSA, said: “In today's increasingly mobile, distributed and cloud-based world, security teams need to enable trusted access to critical resources no matter where the user or resource is located, even if large parts of the infrastructure involved are outside of IT's direct control.

“Today's announcements go a long way towards achieving that goal and deliver on the RSA Cloud Trust Authority vision. Think of it as enabling the security infrastructure to deploy a dynamic perimeter around user access, with the level of authentication determined based on the unique risk of that session. It marries user convenience with far greater security and control for security practitioners.”


Find this article useful?

Get more great articles like this in your inbox every lunchtime

Video and interviews