Enhanced capabilities of the new RSA SecurID Access portfolio include the ability to deploy identity assurance capabilities in the cloud. “Not only can SecurID now be deployed in the cloud, but it can also protect applications that are also deployed in the cloud,” DuCharme said.
where Cloud Access Security Broker (CASB) technologies are often used. DuCharme explained that RSA SecurID Access includes a reverse proxy that provides identity control in the cloud. He added that RSA’s goal is to help provide identity assurance on an ongoing basis.
On the compliance side, RSA has integrated SecurID Access with the RSA Archer GRC (Governance, Risk and Compliance) platform. DuCharme said RSA Archer has a misidentification risk dashboard that can feed data from SecureID Access to help identify and articulate risk, as well as access existing controls. This should help customers manage misidentification risks.
Safety Tales: Attack on Blood
- Good morning, Johann! We have a problem. Or rather, not exactly. We have a PROBLEM!!!
- Good morning, can you give more details?
— In St. Luke's Hospital, infection after surgery. The albania whatsapp data is infected with the N virus.
- So what? I don't see a problem yet.
— The patient was infected with this virus after a blood transfusion. But what's more, within an hour there were two more similar cases. In a military hospital and the central hospital of the security service. And this means that the infection occurred at the central blood distribution point.
- But how can this be?
- Alas, as it turned out, it was easy. In the same building there is a storage facility for blood infected with various viruses for the production of antidotes and experiments.
- So there was a mix-up?
- Yes. Moreover, the distribution of packages there is highly automated, which means that someone got into the computer. This is exclusively your area.
- Got it. Group, get going!
Half an hour passed.
- Chief, the computer is clean. All blood bags are sorted by barcodes. If the barcode does not match the infected ones, then it is sent to the clean ones.
Securing access to cloud applications is an area
-
- Posts: 542
- Joined: Mon Dec 23, 2024 3:13 am