EMC & RSA
RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world’s leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.
RSA delivers agile controls for identity assurance, fraud detection, and data protection; robust Security Analytics and industry-leading GRC capabilities; and expert consulting and advisory services.
RSA provides products and solutions in four key areas to help organizations adopt intelligence-driven security:
Anti-Fraud: Fighting online fraud and cybercrime by diminishing or eliminating losses through the prevention of unauthorized use and/or acquisition of critical information such as credentials and identities.
Identity: Reducing risks to business operations related to digital data and systems by securing interactions between people and information. Protecting the organization’s processes, ensuring confidentiality, integrity, and availability related to information, identities, and infrastructure.
Governance, Risk, And Compliance: Ensuring the organization is compliant in a cost-effective and efficient way that is aligned with both risk and business objectives.
Security Operations: Preparing for, identifying, coordinating, and responding to threats, including Advanced Persistent Threats (APT).
(Source: EMC RSA)
CONET Know-how in the field of RSA:
With special know-how and extensive experience in dealing with heterogeneous IT environments as well as SAP systems of various releases and levels of complexity, CONET is able to offer a comprehensive one-stop management of the complete lifecycle of roles and entitlements with just one central software tool portfolio.
On the basis of RSA technology, CONET provides the following solutions:
- innovative identity and access governance solutions
- efficient recertifcation of roles and authorizations
- Unterstützung des gesamten IAM Lifecycles
With these, organizations of various sizes and any structural complexity may comfortably control user access to information resources with a largely automated process encompassing request, approval, provisioning, reviews and recertification as well as trouble shooting and escalation routines.