RSA Security
Website:
www.rsa.com
Company Profile
RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most
valuable assets from cyber threats. With RSA’s award-winning products, organizations effectively detect, investigate, and
respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime. For more
information, go to www.rsa.com
Company’s USP
What Solutions Do You Offer?
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
RSA® NetWitness® delivers real-time detection for
response in minutes, not months
RSA® Archer empowers organisations to manage
multiple dimensions of risk
RSA® SecurID® Suite – the Smart Identity solution that
protects from endpoint to cloud
RSA Fraud Prevention solutions secure your customers
across multi-channel environments
Advanced Security Operations Center
Security Incident Response
Governance Risk & Compliance
Identity & Access Management
Fraud Prevention
Security Analytics
Advanced Cyber Defence Services
IT and Security Risk Management
Enterprise and Operational Risk Management
Regulatory and Corporate Compliance
Authentication and Access Assurance
Discussion Synopsis
Creating a Business Driven Approach to Security
Cyber security risks have notably evolved over recent years and the challenges facing enterprise organisations both now and in
the future has created a significant level of complexity. Along with these complex cyber threats, issues such as GDPR (General
Data Protection Regulation) and the major impact this has upon businesses defining their cyber security posture, means
organisations need to define an end to end strategy to ensure they can not just maximise their security protection capabilities,
but also have the ability to effectively and efficiently analyse, react and respond to attacks. In this session Andy Waterhouse,
EMEA Presales Director at global leader RSA Security will review the key areas of consideration for todays enterprise and how
to create a business driven approach to cyber security.
Page 25