RSA SecurID® Access
Award-Winning Multi-Factor Authentication and Identity Assurance
Deliver convenient, secure access to your extended enterprise with RSA SecurID Access, the leading multi-factor authentication and identity assurance solution. Whether you deploy it “as a service” in the cloud or on premises, RSA SecurID Access protects both SaaS applications and traditional enterprise resources with a full range of authentication methods and dynamic, risk-driven access policies.
RSA SecurID Access offers a broad range of authentication methods including modern mobile multi-factor authenticators (e.g., push notification, one-time password, SMS and biometrics) as well as traditional hard and soft tokens for secure access to all applications regardless of whether they live on premises or in the cloud.
Support for Multiple Mobile Platforms
RSA SecurID Access can be deployed on Microsoft Windows, Mac OS X, iOS, Android and other platforms. The new RSA Authenticate app for Windows 10 allows customers to use any Windows 10 device (whether a smartphone, tablet or PC) to access applications using advanced mobile authenticators.
RSA SecurID Access protects more than 500 cloud-based and on-premises applications with out-of-the-box certified interoperability. It ensures security is continuously enforced and that users always have appropriate access.
RSA SecurID Access ensures users are who they say they are by examining a range of contextual factors and correlating them in hundreds of ways. It then makes a dynamic, real-time decision to either allow convenient and secure access or require additional step-up authentication.
Get Authentication Your Way
Whether you need two-factor authentication (2FA), multi-factor authentication (MFA) or mobile MFA, RSA offers a wide range of authentication methods including push notifications, SMS, OTP, biometrics, and hardware, software and FIDO tokens. And whether you want to deploy on premises or go with a SaaS option, RSA SecurID Access has you covered.
Apply Risk-Based, Contextual Access Policies
Efficiently configure access requirements and automate access decisions based on risks associated with the areas users operate in, their physical location, application sensitivity, session and network information, and device type—along with many other factors that are evaluated in real time.
CyberRisk has partnered with RSA to bring this technology to Australia.
Contact us if you would like more information, or a demonstration.