Select the directory option from the above "Directory" header!

RSA Whitepapers


Sort by: Date | Company | Title


Finding Evil in the Haystack with RSA ECAT
By RSA | 4/12/2015

With thousands of workstations ans servers under management, most enterprises have noway to effectively make sure they are free of malware and other advanced threats. Today, many sophisticated, targeted attacks rely heavily on unknown (zero-day) vulnerabilities that are delivered leveraging social engineering tactics. Numerous hacking events made public recently have highlighted the vulnerabilities of even the most renowned security companies, government, contractors and fortune 500 enterprises. The problem can affect any enterprise and a new approach to compact these threats must be implemented in order to deal with it effectively.

Download this now


The Evolution of SIEM
By RSA | 4/12/2015

Why is it critical to move beyond the logs?

Whether the result of cyber criminals sending phishing or malware attacks through company emails, nation states targeting an organization’s IP, or insiders misusing sensitive data, we live in a world where prevention of breaches has become impossible. Successful attacks bypass each layer of prevention that we have put in place because they often use valid user credentials, trusted access paths, or new exploits, thus going unnoticed by our preventative controls.

Download this now


The Evolution of SIEM
By RSA | 4/12/2015

Why is it critical to move beyond the logs?

Whether the result of cyber criminals sending phishing or malware attacks through company emails, nation states targeting an organization’s IP, or insiders misusing sensitive data, we live in a world where prevention of breaches has become impossible. Successful attacks bypass each layer of prevention that we have put in place because they often use valid user credentials, trusted access paths, or new exploits, thus going unnoticed by our preventative controls.

Download this now


“ CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT”
By RSA | 4/12/2015

Identity and access governance should be deployed across all types of users associated with an organization -- not just “regular” users but also “privileged” users. Managing regular users separately from privileged users can open your organization up to risk, create security gaps and deprive your organization of a complete view of identity context for access-related decisions.

This white paper will review why connecting a Privileged Access Management (PAM) solution to an access governance solution will enable you to holistically control and audit access to your intellectual property, regulated information and infrastructure systems.

Download this now