TECH DIGITAL RESOURCE LIBRARY

RSA, Security Division of EMC

RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA's award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime.

Our Website: http://rsa.com


Latest Content From RSA, Security Division of EMC

Research Report: 2009 Gartner Report On SIEM

by RSA, Security Division of EMCMay 29, 2009

Discover why Gartner puts RSA in the leader�s quadrant in its 2009 Report on Security Information Event Management (SIEM). Broad adoption of SIEM technology is driven by compliance and security needs.


Whitepaper: 2016: Current State of Cybercrime

by RSA, Security Division of EMCMay 10, 2016

There is a truism in today's clickable economy: wherever there is commerce, there is also the risk for cybercrime. Whether a financial institution, an Internet storefront that does business with online shoppers, and now even hospitals with the rising tide of ransomware, cybercrime has no boundaries. In fact, anyone with an email address, an inbox, or a social media account is a target. As attackers are well-organized and well-informed, take advantage of the latest fraud-as-a-service innovations and capitalize on shared intelligence in the deep web, organizations must be prepared to do the same. This paper examines the current state of cybercrime and how organizations and individuals are responding to the industrialized cybercrime threat.


Whitepaper: 3-D Secure: The Force for CNP Fraud Prevention Awakens

by RSA, Security Division of EMCMar 08, 2016

As recent history dictates, the migration to EMV chip-enabled cards has resulted in a massive surge in card-not-present (CNP) fraud. Converging pressures, including the U.S. EMV migration, rapidly growing e-commerce transaction volumes, and data breaches, is likely to lead to a painfully sharp rise in CNP fraud. Coupled with the proliferation of mobile users, financial institutions and retailers alike have a lot to anticipate.

Download this white paper to learn:

  • The expected financial fraud losses from card-not-present transactions in the next five years
  • How risk-based authentication, mobile and biometrics are changing the payments landscape
  • The latest market dynamics which are expected to impact banks and retailers


Whitepaper: 6 Best Practices To Prevent Enterprise Data Loss

by RSA, Security Division of EMCApr 01, 2009

More than 262 million records have been breached since January 2005 and according Ponemon Institute, data loss is costing companies an average of $6.6 million per breach. According to RSA, following these "Six Best Practices for Preventing Enterprise Data Loss" can help you save millions.


Research Report: Aberdeen Group Report: The Cost-Based Business Case For Data Loss Prevention

by RSA, Security Division of EMCJun 01, 2009

This Aberdeen Group Report�illustrates that Data Loss Prevention technologies can in fact be deployed in a cost-effective manner. Based on Aberdeen customer research, this paper provides the criteria you will need to make the business case for deploying a data loss prevention solution in your enterprise.


Research Report: Actionable Relief For Those Caught In The Middle: RSA Addresses The PCI Challenges Of Level 2 Businesses

by RSA, Security Division of EMCApr 01, 2009

With up to 6 million payment card transactions per year in some cases, the enterprise defined as Level 2 for PCI compliance faces a perplexing dilemma. The Level 2 business carries a level of responsibility for PCI compliance similar to that of the Level 1 enterprise. At the same time, it also suffers many of the same resource constraints that frustrate some smaller organizations. Caught in the middle, the Level 2 business needs an accessible set of tools that can deliver enterprise-quality solutions to its most significant PCI challenges, such as data discovery, access control, event management, compliance reporting, and encryption where warranted.


Research Report: Analyst Report: Data Loss Prevention: Little Leaks Sink The Ship

by RSA, Security Division of EMCMay 01, 2008

This report from Aberdeen Group provides a guideline for organizations interested in data loss prevention (DLP) solutions as part of an overall strategy for protecting sensitive data. Discussions include benchmarking best-in-class, benchmarking requirements for success, steps for success and more.


Research Report: Analyst White Paper: Strategies To Mitigate Information Risk: Data Loss Prevention And Enterprise Rights Management

by RSA, Security Division of EMCJun 01, 2009

Sensitive information risk control has become one of the top priorities in nearly every organization. In this report, a leading analyst in security and risk management reveals the advantages of integrating emerging technologies such as Data Loss Prevention (DLP) and Enterprise Rights Management (ERM).


Whitepaper: Authentication Decision Tree White Paper

by RSA, Security Division of EMCMar 01, 2009

RSA has developed the Authentication Decision Tree -- a comprehensive tool to help organizations understand, evaluate, and select the most appropriate authentication solution to meet the needs of their users and their business. The RSA Authentication Decision Tree provides a framework to help narrow the selection of authentication solutions based on five critical factors. This white paper provides an overview of the Authentication Decision Tree, examines the five factors critical to selecting an authentication solution, and offers a clear guide to selecting the right solution that effectively balances risk, cost, and end user convenience.


Video: Balance Security And Collaboration

by RSA, Security Division of EMCMar 15, 2009

With more sites popping up, security policies become more difficult to enforce and monitor, and sensitive information can be unintentionally dispersed to users who shouldn't have access. RSA features a whiteboard video session on how to balance security and collaboration in your Microsoft SharePoint environment.