VMware

RSA, the Security Division of EMC, is the expert in information-centric security offering industry-leading solutions in identity assurance & access control; encryption & key management; governance & risk management; compliance & security information management and fraud protection.  Using the VMware platform, RSA allows organizations to not only extend virtualization into environments containing sensitive data, but also leverage virtualization technologies to increase security and further reduce risk.  RSA technologies can accelerate an organization’s journey towards a 100 percent virtual environment with confidence.  

Overview of Benefits

Through the integration with VMware, RSA solutions enable organizations to assure protection and trust of enterprise information, and reduced cost of compliance in a virtual environment while deploying the latest technologies. With the help of RSA, organizations can accelerate complete adoption of VMware technologies with integrated security controls, adapt security policies to both physical and virtual IT environments, and advance endpoint security through centrally managed virtual capabilities.

RSA helps VMware customers to:

Assure Protection and Trust

  • Ensure only trusted identities access virtual desktop session
  • Enforce user authentication for administrative access to backend VMware ESX service console and vSphere Management Assistant

Reduce Cost of Compliance

  • Ensure clear visibility into compliance with internal & external policies/regulations
  • Avoid legal penalties and fines

Adapt Policies to Physical & Virtual

  • Extend existing security controls from physical to virtual environment
  • Reduced time spent making changes to policies through embedded security technologies within virtual layer eliminating multiple manage points

Advance Endpoint Security

  • Automate the process of identifying configuration changes that violate policy can help reduce security risk at the endpoint
  • Deliver a more information-centric approach to security where policy and security can be associated with the information itself