TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS



Similar documents
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

White paper. Four Best Practices for Secure Web Access

RSA SecurID Two-factor Authentication

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

RSA Digital Certificate Solution

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

BlackBerry Enterprise Solution and RSA SecurID

Building on a Foundation for Growth: Integrating DLP with Message Security Infrastructure

Strengthen security with intelligent identity and access management

CA Arcot RiskFort. Overview. Benefits

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Secure Administration of Virtualization - A Checklist ofVRATECH

Proven LANDesk Solutions

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

RSA SECURITY MANAGEMENT. An Integrated approach to risk, operations and incident management. Solution Brief

RSA Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard

How To Choose An Authentication Solution From The Rsa Decision Tree

McAfee Security Architectures for the Public Sector

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

SAFEAPP TECHNOLOGY PROGRAM

RSA SecurID Software Token 1.0 for Android Administrator s Guide

Protect Your Customers and Brands with Multichannel Two-Factor Authentication

Paxata Security Overview

Website Security Partner Program. Website Security Partner Program Guide Maximize. Differentiate. Accelerate.

Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.

Safeguarding the cloud with IBM Dynamic Cloud Security

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

RSA SecurID Software Token Security Best Practices Guide

ADAPTIVE IAM: DEFENDING THE BORDERLESS ENTERPRISE

How To Buy Nitro Security

INTELLIGENCE DRIVEN IDENTITY AND ACCESS MANAGEMENT

Securing and protecting the organization s most sensitive data

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

RSA Authentication Manager 8.1 Help Desk Administrator s Guide

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s

White paper. Convenient Multi-Factor Authentication (MFA) for Web Portals & Enterprise Applications

Payment Card Industry Data Security Standard

Brainloop Cloud Security

IT Security. Muscat 15+ ABOUT US IN A GLANCE

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

EMC Security for Microsoft Exchange Solution: Data Loss Prevention and Secure Access Management

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Provide access control with innovative solutions from IBM.

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

CA Service Desk Manager

CA Service Desk Manager

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

RSA Authentication Manager 7.1 Basic Exercises

EMC IT S JOURNEY TO THE PRIVATE CLOUD: APPLICATIONS AND CLOUD EXPERIENCE

IBM Data Security Services for endpoint data protection endpoint encryption solution

Compliance and Security Solutions

Fujitsu Australia and New Zealand Provides Cost-effective and Flexible Cloud Services with CA Technologies Solutions

Detect & Investigate Threats. OVERVIEW

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

IBM Security QRadar Risk Manager

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Securing Enterprise Mobility for Greater Competitive Advantage

The Power of Risk, Compliance & Security Management in SAP S/4HANA

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

Beyond passwords: Protect the mobile enterprise with smarter security solutions

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service

White paper. Creating an Effective Security Operations Function

RSA Solution Brief. RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication. RSA Solution Brief

CA Technologies Healthcare security solutions:

RSA Solution Brief. RSA Adaptive Authentication. Balancing Risk, Cost and Convenience

expanding web single sign-on to cloud and mobile environments agility made possible

RSA ARCHER OPERATIONAL RISK MANAGEMENT

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Preemptive security solutions for healthcare

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

How To Comply With Ffiec

Transcription:

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA Certified Partner Solutions Gallery Joint promotional activities, such as tradeshows, advertising, and seminars Press releases and customersuccess stories Greater awareness of your products to the RSA Sales organization through internal newsletters Mutual demand creation ABOUT THE SECURED BY RSA CERTIFIED PARTNER PROGRAM The Secured by RSA Certified Partner Program is one of the largest and longest-running technology alliance programs of its type, bringing over 1,000 complementary solutions across more than 300 organizations together. RSA SecurID two-factor authentication, RSA Access Manager, RSA Authentication Manager Express, RSA Adaptive Authentication, RSA Archer, RSA Data Protection Manager, RSA Data Loss Prevention, RSA Digital Certificate Manager, and the RSA envision platform certification programs bring added assurance to customers that their solutions are certified as interoperable to help them achieve faster time to deployment and lower overall cost of ownership. The Secured by RSA Certified Partner Program reflects RSA s commitment to driving inventive collaboration across the industry and support standards-based interoperability with its information-centric security solutions to help protect information, identities and infrastructures. TECHNOLOGY PARTNER CERTIFICATION PROCESS Step 1: Program Application The partner can join the Secured by RSA Certified Partner program by contacting the Secured by RSA Certified Partner Program Manager or by applying online through the RSA portal. The initial contact will be established with the partner by the Secured by RSA Certified Partner Program Manager. The initial meetings will focus on identifying stakeholders from the partner team, gathering contact information and scheduling initial meetings to discuss the technology integration between the partner product and RSA product. The Secured by RSA Certified Partner Program Manager will facilitate legal agreements between both the organizations to endorse the relationship formally. Step 2: Partner Selection Technology partners for the Secured by RSA Certified Partner Program will be selected after consultation with Secured by RSA Certified Partner Program Manager, Secured by RSA Certified Partner Engineering Manager and other stakeholders from RSA including RSA Product Management and RSA Product Marketing Management. A case will be built for including the partner into the program based on the market and industry trends, customer and sales demand and analyst recommendations. The cases will be maintained by the Secured by RSA Certified Partner Program Manager. A program acceptance letter will be sent to the partner after the feasibility and business case for the solution is accepted by all the stakeholders. P a r t n e r P r o g r a m

TECHNICAL BENEFITS Access to RSA products for development, certification, promotion, and support Formalized, proven certification process Dedicated certification support from RSA Partner Engineering Access to worldwide support Implementation guides for each certified application Step 3: Certification Criteria The certification criteria will be determined by engaging the product management, the RSA partner engineering team and the partner technical and business development team. The certification criteria will be disclosed to the partner and mutually agreeable demonstration of integration will be finalized. Any changes to the certification criteria should be communicated promptly to all the stakeholders. The certification criteria will be used to construct a verification process and recommend best practices to achieve integration. Step 4: Technology Integration A RSA Partner Engineering team member will be assigned to work with a partner exclusively on the integration. Partners will be provided with SDK, documentation and other relevant tools that can be used in the development of the integration. Information about registering to the customer support portal (RSA SecureCare Online SCOL) will be provided to the partner on case-by-case basis. Partners can use the services of the RSA Partner Engineer to resolve queries related to RSA products during the development process. The RSA Partner Engineer might schedule periodic meetings for status updates on the integration. Step 5: Verification Partner will communicate completion of the integration to the RSA Partner Engineer. RSA Partner Engineer will verify the integration with the battery of standard tests and check the best practice implementation of the solution. Partner will also provide implementation guide that demonstrates the configuration of the solution that enables the partner product and RSA product to work together. This guide will be reviewed by the RSA Partner Engineer for accuracy. Step 6: Certification The certified solution will be hosted on the RSA Solutions Gallery (www.securedbyrsa.com). The information about the partner, partner product and integration solution brief will be included in the solutions gallery. Partner will be provided with certification kit including Secured by RSA Certified Partner Program logo and brand usage guidelines, solutions brief template and press release template. The Secured by RSA Certified Partner Program Manager will coordinate the website hosting and the press release process. Any other go-to-market activities decided prior to the certification will also be scheduled by the Secured by RSA Certified Partner Program Manager. RSA, The Security Division of EMC 2

HELPFUL LINKS: Email Partner Solutions Gallery Apply Now Secured by RSA Certified Partner Program process in a nutshell Apply Legal agreement to formalize relationship Selection Initial calls, introductions of the teams Feasibility analysis of the solution Criteria Determine certification criteria Implementation RSA provides API/toolkits Partner implements solution Verification Verify the integration against certification criteria Certification Certify partner Support post-certification activities RSA, The Security Division of EMC 3

RSA PRODUCTS AVAILABLE FOR TECHNOLOGY INTEGRATIONS RSA Adaptive Authentication RSA Adaptive Authentication is a risk-based authentication platform used by more than 8,000 organizations worldwide across multiple industries. It is designed for large, distributed enterprise environments to help assure user identities using the RSA Risk Engine self-learning risk indicators such as device identification, user behavior profiling, and fraud data from the RSA efraudnetworksm community before interacting with corporate resources and online applications. RSA Adaptive Authentication is engineered to provide convenience for end users through transparent authentication while visible authentication such challenge questions or out-of-band authentication are invoked only when user activity appears unusual or exceeds established policies based upon risk profiles. The RSA Adaptive Authentication platform currently protects more than 250 million people online. RSA Access Manager RSA Access Manager is designed to be a primary component of any identity management system by allowing organizations to provide secure access to web applications within intranets, extranets, portals and exchange infrastructures with transparent, single sign-on access for a positive user experience. Enabling such access can promote improved communication and facilitate business with customers, strengthen partner relationships, bolster employee productivity and reduce support costs. RSA Archer egrc Suite The RSA Archer egrc Suite is the market-leading governance, risk and compliance (GRC) solution chosen by 1 in 2 of the Fortune 100. The RSA Archer egrc Solutions allow organizations to build a collaborative GRC program to manage enterprise risks, demonstrate compliance, automate business processes, and gain visibility into risk and controls. Because the solutions are built on the flexible RSA Archer egrc Platform, business users can tailor the solutions, create supporting applications and integrate with multiple data sources without touching a single line of code. The Archer egrc Community and Exchange provide an active user community and online exchange of applications, content, services and integrations. RSA Data Loss Prevention Suite The RSA Data Loss Prevention (DLP) Suite is designed to leverage state-of-the-art classification technologies to provide comprehensive visibility into the location and usage of sensitive data, such as credit card data, Personally Identifiable Information (PII), intellectual property, and other corporate confidential data. Once RSA DLP locates sensitive data, it is engineered to alert and educate designated personnel and enforce controls based on a customer s customizable policy. The RSA DLP Suite is engineered to both help to uncover business risk associated with the loss of sensitive data and dynamically lower that risk whether the data is at rest, in a datacenter, in motion over the network or in use at endpoints. RSA Digital Certificate Solutions are interoperable modules designed to manage digital certificates and create an environment for authenticated, private and legally binding electronic communications and transactions. Independently tested to scale to more than eight million users per server, RSA Digital Certificate Solutions are built upon open standards, feature interoperability with more than 200 applications, are easy to use and fast to deploy. RSA Digital Certificate Solutions provide the following functions: issue, manage and validate digital certificates; streamline the enrollment process for handling large volumes of end-user certificate requests; enable immediate validation of RSA, The Security Division of EMC 4

digital certificates; securely archive and recover encryption keys of users; and enable enterprises to "chain" their certificate authority to RSA s trusted root. RSA envision RSA envision is a security information and event management (SIEM) platform, enabling security professionals to collect and analyze log and event data to identify high-priority security incidents as they occur. With envision, your security-operations team has a solution for addressing network-security and compliance-management challenges. Analytical software turns unstructured raw data into valuable business information, giving administrators actionable insights to help simplify compliance, optimize incident management, and secure virtual and physical networks. RSA Federated Identity Manager The RSA Federated Identity Manager is an enterprise-ready standalone identity federation solution that enables enterprises to securely exchange user identities between disparate internal business units and with customers and partners, utilizing the latest industry standards. It allows organizations to unlock the true potential of business relationships while maintaining consistent and centralized control over the policies associated with users and applications, and it is designed to be fully standardsbased and compatible with other systems. RSA Identity Verification RSA Identity Verification is a strong authentication solution that assures user identities in real-time and helps prevent the risk of fraud and identity theft. Utilizing knowledgebased authentication (KBA), RSA Identity Verification presents a user with a series of top of mind questions utilizing relevant facts on the individual obtained by scanning dozens of public record databases. With industry leading speed and accuracy, RSA Identity Verification delivers a confirmation of identity within seconds, without requiring a prior relationship with the user. RSA Data Protection Manager RSA Data Protection Manager provides tokenization and encryption controls along with enhanced management features like granular application permissions, customizable encryption and tokenization configurations. It supports full key and token lifecycle management to enable end-to-end data security and lower the total cost of ownership. RSA SecurID RSA SecurID is the market-leading two-factor authentication system used by more than 40 million people across 30,000 organizations worldwide. It is engineered to assure user identities and protect against unauthorized access to applications and resources across numerous physical locations. RSA SecurID technology is comprised of both a broad range of hardware, software and On-demand authenticators that provide end users with a one time password that is designed to change every 60 seconds, as well as its software engine RSA Authentication Manager which scales to support millions of users and provides the benefit of technical certification and interoperability with more than 400 products. RSA, The Security Division of EMC 5

ABOUT RSA RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world s leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention and Fraud Protection with industry leading egrc capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.rsa.com and www.emc.com. ww.rsa.com EMC 2, EMC, RSA and the RSA logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. 2011 EMC Corporation. All rights reserved. Published in the USA.