RSA Solution Brief RSA BSAFE. Security Tools for C/C++ Developers

Similar documents
RSA BSAFE. Security tools for C/C++ developers. Solution Brief

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Public-Key Infrastructure

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

RSA Digital Certificate Solution

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Savitribai Phule Pune University

National Security Agency Perspective on Key Management

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

IT Networks & Security CERT Luncheon Series: Cryptography

Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

IBM i Version 7.3. Security Digital Certificate Manager IBM

Overview. SSL Cryptography Overview CHAPTER 1

CRYPTOGRAPHY IN NETWORK SECURITY

Key Management Interoperability Protocol (KMIP)

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

White paper. Implications of digital certificates on trusted e-business.

RSA SecurID Two-factor Authentication

Digital Certificates Demystified

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Alliance Key Manager Solution Brief

Axway Validation Authority Suite

Understanding digital certificates

Using BroadSAFE TM Technology 07/18/05

Ciphire Mail. Abstract

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Lecture VII : Public Key Infrastructure (PKI)

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

Authentication requirement Authentication function MAC Hash function Security of

2014 IBM Corporation

Secure Sockets Layer

EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support

Security Digital Certificate Manager

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Number of relevant issues

Cornerstones of Security

Cryptography and Network Security Chapter 14

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Complying with PCI Data Security

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Using Entrust certificates with VPN

Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points

IoT Security Platform

The Security Framework 4.1 Programming and Design

Security Policy Revision Date: 23 April 2009

Certification Report

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Securing Distribution Automation

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

Integrated Services Router with the "AIM-VPN/SSL" Module

PKI Services: The Best Kept Secret in z/os

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Secure web transactions system

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Lecture 9: Application of Cryptography

Secure Network Communications FIPS Non Proprietary Security Policy

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Authenticity of Public Keys

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

FIPS Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security

Security Digital Certificate Manager

I N F O R M A T I O N S E C U R I T Y

RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version , October 22, 2012

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

How To Encrypt Data With Encryption

Recommended Wireless Local Area Network Architecture

Module 7 Security CS655! 7-1!

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

PRIME IDENTITY MANAGEMENT CORE

SBClient SSL. Ehab AbuShmais

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

What is a digital certificate, why do I need one, and how do I get it?

WIRELESS LAN SECURITY FUNDAMENTALS

Integrated Services Router with the "AIM-VPN/SSL" Module

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Chapter 1: Introduction

A Noval Approach for S/MIME

Enabling SSL and Client Certificates on the SAP J2EE Engine

Global Telehealth Conference 2012

Transcription:

RSA BSAFE Security Tools for C/C++ Developers

Introduction Built on more than 20 years of expertise in delivering high-quality products for implementing strong security controls in software and networked applications, RSA BSAFE security software for C/C++ Developers: Combines the core security functionality needed by commercial software developers into one common, interoperable and flexible set of libraries Provides solutions which support the latest industry standards, as well as industry and government requirements, including FIPS 140 and Suite B Offers support for open industry standards and broad platform support to ensure interoperability and future flexibility Delivers flexible and highly customizable mainframe environment solutions that effectively protect sensitive data in storage or during transmission to public or private networks Offers proven components that speed time to market for software products DATA SECURITY REQUIREMENTS RSA BSAFE SOLUTIONS High Performance Even for Complex Processes RSA BSAFE software has memory management and protection services to allow more control of the memory allocated to hold the output of large math calculations, which ensures high performance. The software also supports many processor and platform optimizations to further optimize performance. Broad Algorithm Support RSA BSAFE software supports major symmetric and asymmetric algorithms, enabling you to choose the most appropriate algorithm for your unique application constraints Support for Industry Standards RSA BSAFE software supports many widely accepted industry standards including ANSI 9.3.x and 9.4.x, OCSP, FIPS 186-2, and others to enable the broadest compatibility with cryptographic implementations available on the market Support for Government Cryptography Standards including FIPS 140 and Suite B RSA BSAFE software earned FIPS 140 validation certificates. FIPS 140 is required for applications that use cryptography that are intended for use by the U.S. Federal Government. The cryptography software also implements the latest Suite B cryptography standards published by the National Security Agency (NSA). Support for these important standards ensures your software will meet the interoperability and compatibility requirements of government applications. Compliance with Public Key Cryptography Standards (PKCS) RSA BSAFE software complies with Public Key Cryptography Standards (PKCS) which define cryptographic processes for easy interoperability. Adherence to these standards, such as PKCS #7, ensures compliance with customer privacy and regulatory requirements, allows the signing of data messages and the opening of enveloped messages in the processing of large data blocks. Integrates with Existing Public Key Infrastructure (PKI) Implementations Support for multiple Certificate Authorities (CA s), multiple trust models, and standards including OCSP, CRL, CMP, and SCEP, as well as the ability to import and export keys and certificates using open standards Support for X.509 Certificates RSA BSAFE software supports requesting, creating and parsing X.509 certificates. This provides interoperability with X.509 digital certificates issued by standards-based Certificate Authorities. Platform Portability RSA BSAFE software includes specialized interfaces for I/O, time handling, memory management and threading that ease porting to customized application platforms. 2

According to Gartner, companies will continue to place ever more pressure on their software and device vendors to meet certain security requirements in both their own software development life cycles and their products.* Companies are becoming more wary of acquiring software that does not meet the security requirements they are establishing. According to the same Gartner research, companies will be looking for the following basic capabilities in the software solutions they purchase: Does the product encrypt its data store? Does the product encrypt communication? Does the product provide an authentication mechanism when communicating with its own components, third-party components, applications, services, or tools? Companies are also increasingly wary of adding these capabilities after purchase. This is where RSA BSAFE security software for C/C++ developers can help. Access control and authentication are just the first steps in security development: effective security requires a defense in depth strategy using multiple layers of security controls. Customers expect security functionality to adapt to their changing requirements. In addition to protecting customers, software developers also must protect their own intellectual property against compromise and theft. How can developers ensure their applications have the appropriate security depth to meet all these requirements? How do developers ensure applications are not compromised, putting their customers at risk? Encryption Technology Companies are putting more and more pressure on software developers to employ strong security techniques such as encryption to ensure the privacy of sensitive data as well as close vulnerabilities in their applications. Additionally, data security must be persistent for the life of a transaction, from the point of execution through to fulfillment and reconciliation. Implementing RSA BSAFE Crypto software s strong C/C++ Software for Meeting Complex Security Requirements encryption technology helps developers build trust into applications which can then provide persistent protection for sensitive data. Non-repudiation and Strong Authentication Establishing trust in a transactional environment requires certification of the integrity of individual transactions. Trust must also persist throughout the life of the transaction. Two major components are required: validation the transaction comes from an authorized sender, and only that sender, and certification the transaction contents remain unchanged. RSA BSAFE Cert software enables developers to integrate digital transaction signing capabilities which provide a seal of approval on the sender s identity as well as a secure digital wrapper around the contents. This helps enforce nonrepudiation because applications have a record of exactly when and by which entity the transaction was initiated. These capabilities help establish a network of trust for your electronic transactions. Data Security over Open Networks The Sarbanes-Oxley Act and other regulations require companies to establish greater control over sensitive information. Effective security requires defense in depth multiple layers of control. These controls extend to business automation, network and telephony (including VoIP), and mobile access devices. Most companies have deployed firewalls and proxies to secure externally traveling transactions, but ensuring persistent security inside the network is also required. RSA BSAFE SSL software helps developers provide protection for transactions as they travel between applications, ensuring the network link between the application and the next intended destination is a trusted link safe from prying eyes. *Gartner Research, Essential Checklist for Evaluating and Purchasing Secure Software, May 2006 3

RSA BSAFE Crypto Strong Encryption Technology for Software Developers At a Glance Helps application developers comply with data privacy regulations Persistent protection for application data at rest without compromising existing data models High-performance implementations offer effective security without compromising application demands Support for open industry standards ensures interoperability with existing infrastructure and flexibility to adapt to regulatory changes over time Proven components from an industry leader means faster time to market Persistent Protection for Data at Rest Persistent protection requires you to properly secure sensitive data at rest in back-office database systems in addition to standard network security controls. Our RSA BSAFE Crypto software is designed to help you protect sensitive data as it is stored, using strong encryption techniques that ease integration with existing data models. RSA BSAFE Crypto software also supports a wide range of industry standard encryption algorithms offering you the flexibility to choose the option most appropriate to your requirements. The software also incorporates numerous performance optimizations to ensure security does not become a bottleneck to the throughput requirements of your applications. Using the capabilities of RSA BSAFE Crypto software in your application will help provide a persistent level of protection for data, lessening the risk of internal, as well as external, compromise. Standards Support Eases Integration into your Environment Another reason RSA BSAFE Crypto software is used so widely is the software is designed to support many global security standards so important to the business, financial and electronic commerce networks around the globe. RSA also submits its cryptography software for rigorous FIPS 140 testing and validation, the U.S. government standard which specifies the security requirements to be satisfied by a cryptographic module to be used by a Federal agency. This certification further highlights RSA s commitment to providing strong, effective and up-to-date encryption solutions for our customers. RSA BSAFE Crypto software is part of the RSA BSAFE line of data security products for developers. These products provide a complete portfolio of solutions for enterprises, software OEMs, and device manufacturers to meet their regulatory and other data security goals. 4

Key Features of RSA BSAFE Crypto Standards Support FIPS 140-2 Validated Crypto Module Suite B Elliptic Curve Support ANSI X9.30, X9.31, X9.32, X9.42, X9.56, X9.62, X9.63, and X9.80 Support PKCS #1, #5, #8 and 11 Standards Support A broad range of asymmetric (public key) algorithms, symmetric (secret key) ciphers and message digests provides flexibility for a wide variety of security needs. Random number generation via a pseudo-random number generator (PRNG) and the FIPS 186-2 PRNG. Cryptographic Multi-Precision (CMP) Library Key generation services automate key generation and provide for the creation of cryptographic keys. Cryptographic Application Platform Message Digests Symmetric Algorithms Asymmetric Algorithms FIPS 186-2 Pseudo-Random Number Generation Padding Selection Advanced Key Seeding Routines Key Generation Threading Time PCKS #11 Interface Cryptographic syntax and data encoding services comply with public key cryptography standards (PKCS) for more seamless interoperability. Memory management and protection services allow more control of the memory allocated to hold the output of large calculations, providing more flexibility. High-speed math processing provides great performance in calculations of large numbers especially critical in public key operations saving valuable time. Standards-based data-encoding services provide improved interoperability when data in cryptographic applications is transferred between individuals/devices. 5

RSA BSAFE Cert Non-repudiation and Strong Authentication for Sensitive Transactions At a Glance Helps establish a network of trust for electronic transactions Allows developers to validate digital signatures to certify the integrity of transactions Supports non-repudiation by offering certification of a sender s identity for a transaction Support for open industry standards ensures interoperability with existing infrastructure and flexibility to adapt to regulatory changes over time Proven components from an industry leader means faster time to market Public Key Infrastructure: The Open Standard for Establishing Integrity The security demands on today s software applications are rapidly changing. The growth of business process automation and business-tobusiness integration using the Internet requires a mechanism for digital trust not accomplished by traditional physical barriers, usernames/passwords and other authentication and verification methods. Public key infrastructure (PKI) leverages public key cryptography and provides a unified, scalable framework for securing a wide range of enterprise and Internet applications. The scalability of PKI comes from the use of public/private key pairs and the comparative safety in exchanging public keys over open networks. PKI-based digital certificates allow developers to bind public keys to the identities of individuals and entities to support authentication, credential validation and the establishment of rules of trust between parties in a transaction. RSA BSAFE Cert software provides the capabilities software developers need to implement this open standard into their transactional environment. Trust Certificate Directory and Storage Cryptographic Platform Multiple Trust Model Support: Hierarchical and Explicit Chain Validation Online Certificate Status Protocol (OCSP) Support Certificate Revocation List (CRL) Support Cryptographic Message Syntax (CMS) Certificate Lifecycle Management Request, Retrieve, Process and Revoke Certificates Generate Self-Signed Certificates Import and Export Keys or Certificates Interoperability with X.509 v3 Standards-Based CAs Private Key and Certificate Storage Message Digests Symmetric Algorithms Asymmetric Algorithms Key Generation PCKS #11 Interface Threading Time 6

Simplifying Development and Deployment of a Network of Trust RSA BSAFE Cert software gives application developers the capabilities they need to simplify the development of applications for managing digital certificates and integration into a public key infrastructure. These products help organizations and software vendors build open PKI applications and security products not tied to a single PKI vendor. Applications created with these products seamlessly and automatically interoperate with existing PKI products that support Public Key Cryptography Standards (PKCS) and Public Key Infrastructure x.509 (PKIX) standards. In addition to the certificate management functionality, RSA BSAFE Cert software includes protocol support for real-time PKI interaction, including certificate request/response operations such as certificate enrollment, look-up and validation. Key Features of RSA BSAFE Cert Directory and PKI access services provide flexibility, interoperability and developer ease of use through a directory interface which provides storage and retrieval of keys and certificates. PKI access allows for certificate-enabled applications to work out of the box with standards-based certificate authorities. Cryptographic message syntax (CMS) services support standards on how to encode signed and/or enveloped messages so they may be securely exchanged over open networks to allow for interoperability and ease of use. Trust services allow increased flexibility by supporting chain validation of hierarchical trust relationships and support for multiple trust models, e.g., self-signed certificates and explicit trust relationships. Certificate services provide facilities to create, request, retrieve and store digital certificates, including support for self-signed certificates, and cross-certificates. Support for certificate extension extraction and certificate revocation enables full certificate life-cycle management. Cert software is built on the strong cryptographic and authentication services provided by RSA BSAFE Crypto software. Multi-threaded code generation improves the performance of certificate and key handling operations. Request a certificate via PKCS#10, public key cryptography infrastructure (X.509) [PKIX], Certificate Request Syntax (CRS), Certificate Management Protocol (CMP) or Simple Certificate Enrollment Protocol (SCEP). Retrieve a certificate via PKCS#7, Basic Encoding Rules (BER), Distinguished Encoding Rules (DER), CRS, CMP or SCEP. Process a certificate Extract a public key Generate a self-signed certificate Extract certificate extensions (parsing) Provide for full certificate extension support Verify a certificate signature Revoke a certificate with CMP Check a certificate revocation with Online Certificate Status Protocol (OCSP) and Certificate Revocation List (CRL) Sign data with PKCS#7 signatures or digital signatures via cryptography product Import keys and certificates from other sources with PKCS#7, 8 and 12 Export certificates to other sources with PKCS#12 Export private keys to other sources with PKCS#8 Store private keys and certificates in LDAP, inmemory database or full-featured database (CodeBase) 7

RSA BSAFE SSL Protection for Sensitive Data Traveling Over Open Networks At a Glance Provides protection for sensitive data as it travels over open networks, both internal and external Uses the open standard Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols to provide data protection for network transactions Allows developers to implement persistent protection for sensitive transactions to the edge of the network Proven components from an industry leader means faster time to market compared to open-source offerings Extending Security To The Edge Of The Network The tools of electronic transactions and the technologies that support them from the Internet and e-mail to VPN and WAP gateways are all vulnerable to attack by hackers and mischief-makers. These transactions and agreements can be tampered with, forged and blocked, while communications sent via e- mail and wireless technologies can be intercepted and their confidentiality broken. These threats also extend inside the network perimeter. Regulatory compliance and assurance of data privacy requires persistent enforcement of security rules throughout the network. RSA BSAFE SSL software will help application developers build persistent enforcement into their applications for all network transactions from the edge of the network through to internal systems. Secure Sockets Layer (SSL): The Open Standard for Creating Trusted Networks Secure Sockets Layer (SSL) is the Internet security protocol for point-to-point connections. It provides protection against eavesdropping, tampering and forgery. Clients and servers establish a secure link (or pipe ) across the Internet to protect the information being sent and received. Customers can have confidence their information is confidential, authentic and original during an Internet connection using SSL. It is a formidable task for developers to become familiar with the various areas to consider, such as the protocol infrastructure, upper layer services and underlying cryptographic algorithms. Using RSA BSAFE SSL software, developers can easily add support for creating trusted network links between applications providing persistent security for transactions as they travel over open internal and external networks. 8

Key Features of RSA BSAFE SSL Protocol Network Layer Optimizations Blocking and Non-Blocking I/O Support Session Caching Built-in Protocol Handler TLS v1 Support Support for standard SSL v2, SSL v3 and TLS v1 protocols Support for public key cryptography standards (PKCS) #1, 10, and 11 Supports requesting, creating and parsing X.509 standard digital certificates SSL v2 and v3 Support Supports client / server authentication and message authentication using the HMAC standard Certificate Cryptographic Platform Client and Server Authentication PKCS#1, #10 and #11 Support Certificate Management FIPS 140 Crypto Support Protocol Cipher Suites Threading Time PCKS #11 Interface Network layer optimizations support multiple network protocols with a built-in protocol handler, session caching and blocking I/O with non-blocking I/O support Improves scalability by including code optimizations to run on popular platforms and processors; supports multi-threaded use. RSA s implementation of HP s patented MultiPrime technology helps optimize the performance of RSA private key operations in SSL transactions. 9

Appendices Complying with Data Security Guidelines for Government Systems Our technology meets or exceeds the information security best practices and requirements established by the U.S. National Institute for Standards in Technology (NIST) and the U.S. National Security Agency (NSA) as specified in FIPS 140, Suite B, and other security standards. Our customers including Lockheed Martin, Northrop Grumman, the U.S. Department of Homeland Security, the U.S. Senate, and many other agencies and their suppliers count on RSA technology that meets these standards to keep highly sensitive information protected. RSA submits all of its cryptography products for FIPS 140 testing and validation through the rigorous Cryptographic Module Validation Program (CMVP) established by NIST. The FIPS 140 validation program assures cryptographic libraries meet defined characteristics for robustness, security of the architecture, and support for standard algorithms. We have also added support for the Suite B cryptography standards. This support allows us to meet the latest commercial cryptography software requirements for protection of classified and other sensitive information in government agencies. We continually update our solutions to meet the latest NIST guidelines so our customers have the confidence of using the most reliable security technology available for protecting network transactions, data stores, and device applications. Support for Mainframe Systems Not everyone is using databases to store all their persistent data. This data is often still stored in VSAM or QSAM data sets on the mainframe. Additionally, many transaction or extract files exist containing transient data. While UNIX System and hierarchical file systems have been part of the IBM zseries environment for many years, hierarchical file systems are still not the predominant data storage location. RSA supports Language Environment based program development with RSA BSAFE for C/++ Developers software. PLATFORM SUPPORT CRYPTO CERT SSL Operating Systems Microsoft Windows Sun Solaris HP-UX Red Hat Linux Novell SUSE Linux IBM AIX z/os OS/400 Ports on many other platforms available 10

Algorithm Support Supported Standards RSA, RSA with MultiPrime technology, DSA and Diffie-Hellman AES, RC5 *, RC4, RC2, DES, 3DES and DESX** MD2, MD5, HMAC, SHA-1, SHA-224**, SHA-256*, SHA-384* and SHA-512* Elliptic Curve Digital Signature Algorithm (ECDSA), Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Authenticated Encryption Scheme (ECAES)** SEED (Korean algorithm) ** FIPS 140 for Crypto and SSL SSL v2, SSL v3, and TLS v1 protocols for SSL American National Standards Institute (ANSI) X9.30, X9.31, X9.32, X9.42, X9.56, X9.62, X9.63, and X9.80 for Crypto Public Key Cryptography Standards (PKCS) #1, 5, 8, and 11 for Crypto #1, 3, 5, 7, 8, 10, 11 and 12 for Cert, #1, 10, and 11 for SSL Certificate format X.509 v3 for Cert and SSL LDAP directory v2 for Cert * Supported in the RSA BSAFE Crypto and Cert software ** Supported only in the RSA BSAFE Crypto software 11

RSA is your trusted partner RSA, The Security Division of EMC, is the expert in information-centric security, enabling the protection of information throughout its lifecycle. RSA enables customers to cost-effectively secure critical information assets and online identities wherever they live and at every step of the way, and manage security information and events to ease the burden of compliance. RSA offers industry-leading solutions in identity assurance & access control, encryption & key management, compliance & security information management and fraud protection. These solutions bring trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.rsa.com and www.emc.com. 2007 RSA Security Inc. All Rights Reserved. RSA, RSA Security, BSAFE and the RSA logo are either registered trademarks or trademarks of RSA Security Inc. in the United States and/or other countries. Windows and Microsoft are registered trademarks or trademarks of the Microsoft Corporation in the U.S. and/or other countries. EMC is a registered trademark of EMC Corporation. All other products and services mentioned are trademarks of their respective companies. BCCD SB 0407