The RSA Archer GRC Platform provides a common foundation for managing policies, controls, risks, assessments and deficiencies across your lines of business. The Platform is designed to be:

• Flexible – The Platform offers a point-and-click interface for building
and managing business applications. Non-technical users can automate
processes, streamline workflow, control user access, tailor the user
interface and report in real-time.

• Unified – RSA provides as common platform to manage policies, controls,
risks, assessments and deficiencies across lines of business. This unified
approach eases system complexity, strengthens user adoption and reduces
training time.

• Collaborative – The Platform enables cross-functional collaboration and
alignment. Business users across IT, finance, operations and legal domains can
work together in an integrated framework using common processes and data.

PLATFORM COMPONENTS::
1- Application builder
2- Search, reports and dashboards
3- Advanced business workflow
4- Access control
5- User experience
6- System integration
7- Relationship Visualization
8- Globalization
9- Deployment flexibility
10- Archer GRC Community on RSA Link

For More Information Please Visit The Link Below:
https://www.rsa.com/en-us/products/governance-risk-and-compliance/archer...

AUTOMATE, INTEGRATE,MANAGE & REPORT ACROSS YOUR ENTERPRISE

SIEM - SECURITY INFORMATION AND EVENT MANAGEMENT

The RSA NetWitness Platform is an evolved SIEM and threat detection and response solution that allows security teams to rapidly detect and respond to any threat, anywhere.

Serves as a single, unified platform for all your security data
Features an advanced analyst workbench for triaging alerts and incidents
Orchestrates security operations programs end to end

FEATURES:
1-Real-Time Data Enrichment
2-Extensive Metadata
3-Multifaceted Analytics
4-Session Replay
5-Complete Incident Management
6-Flexible Deployment Options

For More Information Please Visit The Link Below:
https://www.rsa.com/en-us/products/threat-detection-response/siem-securi...

TWO-FACTOR AUTHENTICATION: RSA SECURID® SOFTWARE TOKENS

With RSA SecurID software tokens, you’ll never manage or distribute token records again. The new soft tokens are self-registered, automatically seeded, never expire and support optional fingerprint verification instead of a traditional PIN. Deploy RSA SecurID software tokens across your devices, and make two-factor authentication a convenient part of doing business.

Benefits:
1-RSA SecurID software tokens can streamline the workflow associated with distributing and managing two-factor authentication to global, mobile workforces.
2-RSA SecurID software tokens use a highly secure provisioning protocol, the Cryptographic Token Key Initialization Protocol (CT-KIP), to support two-factor authentication.
3-RSA SecurID software tokens integrate with more than 400 applications and devices. Integrations are available free of charge and are jointly tested by RSA and partners.
4-Organizations may elect to use quick response (QR) code provisioning, which requires no transmission of confidential token information over the network and can securely bind a token to a device.
5-Software tokens limit the number of devices users have to manage to gain seamless, secure access to corporate assets.
6-RSA SecurID software tokens support the most popular and widely deployed mobile platforms, including iOS, Android, Windows Phone and Blackberry.
7-RSA SecurID software tokens use the same industry-leading, time-based algorithm as the RSA SecurID hardware tokens. Instead of being stored in hardware, the software token symmetric key is secured on the user’s PC, laptop, smartphone or USB device.
8-Companies can reissue RSA SecurID software tokens when users leave, which helps organizations protect and extend their investment in the technology. They can also quickly revoke software tokens when someone loses a device, easing mobile device management.

For More Information Please Visit The Link Below:
https://www.rsa.com/en-us/products/rsa-securid-suite/rsa-securid-access/...

What Is UEBA?
UEBA, which stands for user and entity behavior analytics, is software that analyzes user activity data from logs, network traffic and endpoints and correlates this data with threat intelligence to identify activities—or behaviors—likely to indicate a malicious presence in your environment. It uses machine learning technology to baseline “normal” behavior and get smarter over time, and applies both static rules and statistical analysis to rapidly and accurately detect suspicious activity. Using such advanced technology and statistical models, UEBA is a force multiplier for security teams struggling to stay on top of today’s advanced, targeted threats.

RSA NetWitness UEBA

Spot insider threats and external attackers exploiting compromised credentials BEFORE those activities lead to a data breach. RSA NetWitness UEBA:

-Leverages user, network AND endpoint behavior profiling to identify abnormal behaviors
-Detects abuse and misuse of privileged accounts, brute force attacks, account manipulation and other malicious activities
-Requires no customization, ongoing care, or rule authoring, creation or adjustment