Content Offers
Check out some of our most popular reports and webinars, organized by topic.
Identity and access management
Video
Modernizing Authentication: What It Takes to Transform Secure Access
Securing access to sensitive data in the age of cloud and mobile requires a very different approach to authentication and identity management.
E-Book
5 Ways to Transform Secure Access and Secure the Digital Enterprise
Learn how you can prevent credential-based attacks by securing a wide range of access point across your enterprise with modern MFA.
integrated risk management
White Paper
7 Steps to Build a GRC Framework
This comprehensive guide to managing digital risk provides clear, practical advice that will help you get your arms around the risks facing your organization.
Analyst Report
The Business Value of RSA Archer® in Making Governance, Risk and Compliance Operations More Efficient and Effective
IDC conducted independent, in-depth interviews with several large organizations that have implemented RSA Archer® and quantified the key performance improvements (productivity benefits, cost savings, etc.) that these companies realized as a result.
threat detection and response
White Paper
RSA NetWitness®: Extending Security Technology to the Cloud
Getting visibility into threats lurking in your cloud environments is a common challenge for organizations. Find out how the RSA NetWitness Platform can help you overcome it.
Video
The New RSA NetWitness® Suite: See What an Evolved SIEM Can Do for You
See the new RSA NetWitness Suite in action in this webinar. Get an inside look at the features and capabilities that set it apart from other threat detection platforms.
Fraud prevention
Analyst Report
Business-Driven Fraud Management: Engaging with Leadership to Drive Investment
Javelin Strategy & Research interviewed executives at leading financial services companies and major retailers to find out how they measure fraud prevention success and how they make the case for more funding.
Video
An Inside Look at Account Takeover
RSA cracks open the Sentry MBA toolkit, one of the most popular automated attack tools cybercriminals are using to conduct account takeover on major websites, and shows you how it works.
GDPR
Analyst Report
A Practical Guide for GDPR Compliance
Osterman Research provides a lucid overview of GDPR and its essential requirements, and shares a comprehensive checklist to facilitate your compliance activities.
White Paper
GDPR Compliance: Building on the Past, Preparing for the Future
A different take on GDPR, this white paper examines the regulatory environment and prior directives that shaped the new law, and what it may require of companies in the future.