19.02.2015 Views

2014 Digital Yearbook of Homeland Security Awards

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

RSA Securit y Division <strong>of</strong> EMC –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Privileged Access Management Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Identity Management and Governance<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In the era <strong>of</strong> big data, mobile, cloud, and social media,<br />

identity and access management (IAM) has become a<br />

significant challenge for many organizations. Add on<br />

heightened threats, strict regulatory requirements, and<br />

a growing and demanding population <strong>of</strong> business users,<br />

securing access and enabling trusted interactions between<br />

users and resources can feel like a never ending<br />

game <strong>of</strong> whack-a-mole. The RSA Identity Management<br />

and Governance (IMG) solution helps organizations<br />

transform IAM into an enabler for a faster and more<br />

secure network by taking aim at three key ways in which<br />

organizations can deliver a strong Identity Management<br />

program:<br />

1. Identity Lifecycle Management — Streamlined selfservice<br />

user registration allows users to create accounts<br />

and choose access rights for themselves, new employees<br />

and contractors. The UI automatically enforces policies<br />

while suggesting entitlements based on similar users.<br />

Automated approval workflows and provisioning<br />

ensures that user access is delivered rapidly, while maintaining<br />

compliance with process and policy requirements.<br />

2. Data Access Governance. – With an increase in both<br />

data breaches and compliance requirements, it is critical<br />

to extend access governance to data as well as applications.<br />

RSA IMG is designed to provide ubiquitous support<br />

across all major file systems, providing one place to<br />

centrally manage and govern the access to all data. RSA<br />

IMG leverages identity context and data attributes (such<br />

as user access frequency) to establish a line-<strong>of</strong>-business<br />

owner for data resources.<br />

26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!