ChannelLife New Zealand - Industry insider news for technology resellers
Story image
Regain control through RSA's risk-based authentication
Wed, 8th May 2013
FYI, this story is more than a year old

Every organisation needs secure authentication. But your users are not all the same.

Some need robust, fully-compliant access for sensitive work, yet the majority, typically 80%, don't.

Enter RSA, who says that although the cost of two-factor authentication may not be warranted, password only access is just not enough.

Risk-Based Authentication, optionally available with new RSA Authentication Manager 8.0 software, is designed to offer cost-effective, transparent threat protection however customers or employees access your systems.

Benefits include:

• Authorise authentication automatically based on device and behaviour intelligence

• Centralise administration and management

• Cut per user costs by up to 40%

Thing big, spend less

RSA says security always seems at odds with convenience and cost, and in the face of myriad different user devices, you need protection from advanced threats.

But there's always a finite budget and limited resources available and compromises must be made.

Risk-Based Authentication re-writes the rules however, enabling infrequent and non-sensitive access, right across the enterprise, for up to 40% less per user than hardware authenticators.

Centralise administration

On average, each employee calls an IT help desk 21 times a year with a typical using having 25 unique passwords - little wonder that 30% of all help desk calls relate to a password re-set?

Fortunately, new RSA's software introduces a self-service console allows users to create, manage and troubleshoot their own multi-factor SecurID login.

Administrators can also instantly view and control access credentials enterprise-wide via a single dashboard.

Deploying advanced technology can attract substantial savings also according to RSA.

Take Risk-Based Authentication as an example - the lowest cost authentication method since SMS text.

Intelligent, on-the-fly profiling of access attempts not only reduces per user costs versus traditional hardware authenticators by up to 40%; it is also designed to support the deployment of up to 10,000 users in an hour.

Mobile and remote access? Users bringing their own device? Virtualisation? IT-as-a-Service?

Do you see these trends as business opportunities – or merely more vulnerable platforms to protect from hackers and threats?

RSA's software is designed to ensure that, however your business needs to operate and grow, it won't be a lack of secure authentication that leaves you exposed.

• Set policies based on risk scrutinising both device and behaviour

• Invoke step-up authentication only when genuinely warranted

• Streamline administration and reduce costly overheads