RSA Whitepapers


Sort by: Date | Company | Title


Translating Security Leadership into Board Value
By RSA | 12/5/2017

What Boards Want to Know and CISOs Need to Say

Seven years ago in the SBIC report Bridging the CISO-CEO Divide, we explored the best practices security leaders could use to communicate more effectively with their C􀀁Os. CISOs were at a crossroads and just beginning to take a seat at the executive table. We provided recommendations from global leaders about ways CISOs could embrace their growing leadership role, build trust with the executive leadership team and earn the confidence of their C􀀁O. We discussed how harting a new course based on a strategic, risk-based approach to information security would drive clear business value.

Download this now


RSA SECURID® SUITE: Accelerate Business While Mitigating Identity Risk
By RSA | 1/3/2017

Introducing the RSA SecurID® Suite, the only identity and access assurance solution that meets the dynamic access needs of today’s modern workforce.

The RSA SecurID Suite offers a comprehensive set of capabilities including access management, authentication, risk analytics, identity governance and life-cycle management.

The RSA SecurID Suite helps solve two fundamental challenges for your organisation. Are my users who they say they are, and do they have the right level of access?

Download this now


Reimagine Your Identity Strategy
By RSA | 1/3/2017

What if imagination and creativity flowed as freely in your business? Unhindered by fear or insecurity, you’d have the courage, ambition and hope to reach new users, deploy new technologies and grow your business faster. You could conquer the world (or at least the marketplace).

Your identity strategy should be the wings that keep your business—and your users—soaring.

Reimagine your identity strategy with the RSA SecurID® Suite, the industry’s most advanced identity and access assurance solution that helps minimise risk and accelerate business. With the RSA SecurID Suite, you’re free to explore a world of limitless possibility.

Download this now


A New Paradigm For Identity Assurance
By RSA | 1/3/2017

The criminals, hacktivists, and others trying to breach corporate cybersecurity are just like anyone else: they want to accomplish their mission as efficiently as possible. So why focus on compromising an organisation's access device or infrastructure? That’s not where the action is.

Advanced threats today target what is on either side of those systems: the user sitting at the keyboard, and the corporate data he or she has access to as part of the job. The goal for the attacker is to compromise identities, impersonate legitimate users to glide past security controls, find valuable data, and glide back out undetected.

Read this whitepaper to find out more.

Download this now


Security Analytics: The Cornerstone Of Modern Detection And Response
By RSA | 5/2/2016

Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. Given the proliferation and sophistication of malicious entities, organizations must assume that they will be infiltrated and have an effective detection and response strategy. In this report Forrester Consulting evaluates how the capabilities of SIEM and security analytics solutions stack up against the current threat landscape.

Download this now


When Advanced Persistent Threats go Mainstream - Building Information-Security Strategies to Combat Escalating Threats
By RSA | 14/11/2011

Inside this report: Key characteristics of APTs, how enterprises are making themselves vulnerable, new approaches to information security, and seven defensive measures against escalating threats.

Download this now


Enterprise Governance, Risk and Compliance: A New Paradigm to Meet New Demands
By RSA | 14/11/2011

In our increasingly globalised environment, economies and enterprises are steadily becoming interrelated. Yet many key functions and departments the deal with related information and business processes remain siloed. The answer is to bring governance, risk management and compliance together in an integrated program where policies, data and controls are strategically managed and visible throughout the enterprise.

Download this now


Managing Risk on the Journey to Virtualization and the Cloud
By RSA | 11/5/2011

In this paper, ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) highlights how the RSA Solution for Cloud Security and Compliance offers such an approach. Centered on the well-accepted RSA Archer eGRC platform and enVision® platform technologies for security and compliance information and event management.

Download this now


A Guide to Staying Secure Amidst Gorwing Threats and the Expanding Digital Universe
By RSA | 11/5/2011

Security management needs to evolve to protect business, government, and individuals from growing cyber threats. This Paper outlines challenges facing security executives and teams and uses an “air traffic control system” analogy to show how advanced security management systems can deliver better security by providing a single point of visibility and coordination for physical, virtual, and cloud assets. Solutions are presented where business processes, policy, controls, and data work in concert to achieve the vision of an air traffic control system for information security.

Download this now


Infrastructure Security: Getting to the Bottom of Compliance in the Cloud
By RSA | 11/5/2011

In cloud environments, one of the most pervasive and fundamental challenges for organizations in demonstrating policy compliance is proving that the physical and virtual infrastructure of the cloud can be trusted – particularly when those infrastructure components are owned and managed by external service providers. Read on.

Download this now