TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA Certified Partner Solutions Gallery Joint promotional activities, such as tradeshows, advertising, and seminars Press releases and customersuccess stories Greater awareness of your products to the RSA Sales organization through internal newsletters Mutual demand creation ABOUT THE SECURED BY RSA CERTIFIED PARTNER PROGRAM The Secured by RSA Certified Partner Program is one of the largest and longest-running technology alliance programs of its type, bringing over 1,000 complementary solutions across more than 300 organizations together. RSA SecurID two-factor authentication, RSA Access Manager, RSA Authentication Manager Express, RSA Adaptive Authentication, RSA Archer, RSA Data Protection Manager, RSA Data Loss Prevention, RSA Digital Certificate Manager, and the RSA envision platform certification programs bring added assurance to customers that their solutions are certified as interoperable to help them achieve faster time to deployment and lower overall cost of ownership. The Secured by RSA Certified Partner Program reflects RSA s commitment to driving inventive collaboration across the industry and support standards-based interoperability with its information-centric security solutions to help protect information, identities and infrastructures. TECHNOLOGY PARTNER CERTIFICATION PROCESS Step 1: Program Application The partner can join the Secured by RSA Certified Partner program by contacting the Secured by RSA Certified Partner Program Manager or by applying online through the RSA portal. The initial contact will be established with the partner by the Secured by RSA Certified Partner Program Manager. The initial meetings will focus on identifying stakeholders from the partner team, gathering contact information and scheduling initial meetings to discuss the technology integration between the partner product and RSA product. The Secured by RSA Certified Partner Program Manager will facilitate legal agreements between both the organizations to endorse the relationship formally. Step 2: Partner Selection Technology partners for the Secured by RSA Certified Partner Program will be selected after consultation with Secured by RSA Certified Partner Program Manager, Secured by RSA Certified Partner Engineering Manager and other stakeholders from RSA including RSA Product Management and RSA Product Marketing Management. A case will be built for including the partner into the program based on the market and industry trends, customer and sales demand and analyst recommendations. The cases will be maintained by the Secured by RSA Certified Partner Program Manager. A program acceptance letter will be sent to the partner after the feasibility and business case for the solution is accepted by all the stakeholders. P a r t n e r P r o g r a m
TECHNICAL BENEFITS Access to RSA products for development, certification, promotion, and support Formalized, proven certification process Dedicated certification support from RSA Partner Engineering Access to worldwide support Implementation guides for each certified application Step 3: Certification Criteria The certification criteria will be determined by engaging the product management, the RSA partner engineering team and the partner technical and business development team. The certification criteria will be disclosed to the partner and mutually agreeable demonstration of integration will be finalized. Any changes to the certification criteria should be communicated promptly to all the stakeholders. The certification criteria will be used to construct a verification process and recommend best practices to achieve integration. Step 4: Technology Integration A RSA Partner Engineering team member will be assigned to work with a partner exclusively on the integration. Partners will be provided with SDK, documentation and other relevant tools that can be used in the development of the integration. Information about registering to the customer support portal (RSA SecureCare Online SCOL) will be provided to the partner on case-by-case basis. Partners can use the services of the RSA Partner Engineer to resolve queries related to RSA products during the development process. The RSA Partner Engineer might schedule periodic meetings for status updates on the integration. Step 5: Verification Partner will communicate completion of the integration to the RSA Partner Engineer. RSA Partner Engineer will verify the integration with the battery of standard tests and check the best practice implementation of the solution. Partner will also provide implementation guide that demonstrates the configuration of the solution that enables the partner product and RSA product to work together. This guide will be reviewed by the RSA Partner Engineer for accuracy. Step 6: Certification The certified solution will be hosted on the RSA Solutions Gallery (www.securedbyrsa.com). The information about the partner, partner product and integration solution brief will be included in the solutions gallery. Partner will be provided with certification kit including Secured by RSA Certified Partner Program logo and brand usage guidelines, solutions brief template and press release template. The Secured by RSA Certified Partner Program Manager will coordinate the website hosting and the press release process. Any other go-to-market activities decided prior to the certification will also be scheduled by the Secured by RSA Certified Partner Program Manager. RSA, The Security Division of EMC 2
HELPFUL LINKS: Email Partner Solutions Gallery Apply Now Secured by RSA Certified Partner Program process in a nutshell Apply Legal agreement to formalize relationship Selection Initial calls, introductions of the teams Feasibility analysis of the solution Criteria Determine certification criteria Implementation RSA provides API/toolkits Partner implements solution Verification Verify the integration against certification criteria Certification Certify partner Support post-certification activities RSA, The Security Division of EMC 3
RSA PRODUCTS AVAILABLE FOR TECHNOLOGY INTEGRATIONS RSA Adaptive Authentication RSA Adaptive Authentication is a risk-based authentication platform used by more than 8,000 organizations worldwide across multiple industries. It is designed for large, distributed enterprise environments to help assure user identities using the RSA Risk Engine self-learning risk indicators such as device identification, user behavior profiling, and fraud data from the RSA efraudnetworksm community before interacting with corporate resources and online applications. RSA Adaptive Authentication is engineered to provide convenience for end users through transparent authentication while visible authentication such challenge questions or out-of-band authentication are invoked only when user activity appears unusual or exceeds established policies based upon risk profiles. The RSA Adaptive Authentication platform currently protects more than 250 million people online. RSA Access Manager RSA Access Manager is designed to be a primary component of any identity management system by allowing organizations to provide secure access to web applications within intranets, extranets, portals and exchange infrastructures with transparent, single sign-on access for a positive user experience. Enabling such access can promote improved communication and facilitate business with customers, strengthen partner relationships, bolster employee productivity and reduce support costs. RSA Archer egrc Suite The RSA Archer egrc Suite is the market-leading governance, risk and compliance (GRC) solution chosen by 1 in 2 of the Fortune 100. The RSA Archer egrc Solutions allow organizations to build a collaborative GRC program to manage enterprise risks, demonstrate compliance, automate business processes, and gain visibility into risk and controls. Because the solutions are built on the flexible RSA Archer egrc Platform, business users can tailor the solutions, create supporting applications and integrate with multiple data sources without touching a single line of code. The Archer egrc Community and Exchange provide an active user community and online exchange of applications, content, services and integrations. RSA Data Loss Prevention Suite The RSA Data Loss Prevention (DLP) Suite is designed to leverage state-of-the-art classification technologies to provide comprehensive visibility into the location and usage of sensitive data, such as credit card data, Personally Identifiable Information (PII), intellectual property, and other corporate confidential data. Once RSA DLP locates sensitive data, it is engineered to alert and educate designated personnel and enforce controls based on a customer s customizable policy. The RSA DLP Suite is engineered to both help to uncover business risk associated with the loss of sensitive data and dynamically lower that risk whether the data is at rest, in a datacenter, in motion over the network or in use at endpoints. RSA Digital Certificate Solutions are interoperable modules designed to manage digital certificates and create an environment for authenticated, private and legally binding electronic communications and transactions. Independently tested to scale to more than eight million users per server, RSA Digital Certificate Solutions are built upon open standards, feature interoperability with more than 200 applications, are easy to use and fast to deploy. RSA Digital Certificate Solutions provide the following functions: issue, manage and validate digital certificates; streamline the enrollment process for handling large volumes of end-user certificate requests; enable immediate validation of RSA, The Security Division of EMC 4
digital certificates; securely archive and recover encryption keys of users; and enable enterprises to "chain" their certificate authority to RSA s trusted root. RSA envision RSA envision is a security information and event management (SIEM) platform, enabling security professionals to collect and analyze log and event data to identify high-priority security incidents as they occur. With envision, your security-operations team has a solution for addressing network-security and compliance-management challenges. Analytical software turns unstructured raw data into valuable business information, giving administrators actionable insights to help simplify compliance, optimize incident management, and secure virtual and physical networks. RSA Federated Identity Manager The RSA Federated Identity Manager is an enterprise-ready standalone identity federation solution that enables enterprises to securely exchange user identities between disparate internal business units and with customers and partners, utilizing the latest industry standards. It allows organizations to unlock the true potential of business relationships while maintaining consistent and centralized control over the policies associated with users and applications, and it is designed to be fully standardsbased and compatible with other systems. RSA Identity Verification RSA Identity Verification is a strong authentication solution that assures user identities in real-time and helps prevent the risk of fraud and identity theft. Utilizing knowledgebased authentication (KBA), RSA Identity Verification presents a user with a series of top of mind questions utilizing relevant facts on the individual obtained by scanning dozens of public record databases. With industry leading speed and accuracy, RSA Identity Verification delivers a confirmation of identity within seconds, without requiring a prior relationship with the user. RSA Data Protection Manager RSA Data Protection Manager provides tokenization and encryption controls along with enhanced management features like granular application permissions, customizable encryption and tokenization configurations. It supports full key and token lifecycle management to enable end-to-end data security and lower the total cost of ownership. RSA SecurID RSA SecurID is the market-leading two-factor authentication system used by more than 40 million people across 30,000 organizations worldwide. It is engineered to assure user identities and protect against unauthorized access to applications and resources across numerous physical locations. RSA SecurID technology is comprised of both a broad range of hardware, software and On-demand authenticators that provide end users with a one time password that is designed to change every 60 seconds, as well as its software engine RSA Authentication Manager which scales to support millions of users and provides the benefit of technical certification and interoperability with more than 400 products. RSA, The Security Division of EMC 5
ABOUT RSA RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world s leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention and Fraud Protection with industry leading egrc capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.rsa.com and www.emc.com. ww.rsa.com EMC 2, EMC, RSA and the RSA logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. 2011 EMC Corporation. All rights reserved. Published in the USA.