SecurID Software Tokens use the same industry-leading time-based algorithm used in RSA SecurID Hardware Tokens.
Software tokens use a secure provisioning protocol, Cryptographic Token Key Initialization Protocol (CT-KIP), with the option of Quick Response (QR) code provisioning that requires no transmission of confidential token information over the network and can securely bind a token to a device.
Software tokens reduce the number of devices users have to manage to gain safe and secure access to corporate assets.
Companies can reissue software tokens when users leave the organization.
SecurID Software Tokens support a variety of the most popular and widely deployed mobile platforms.
RSA SecurID Software Tokens make strong authentication a convenient part of doing business.
Simple Management and End-User Convenience: Best of Both Worlds
SecurID Software Tokens reduce the number of items a user has to manage for safe and secure access to corporate assets. It can streamline the workflow for distributing and managing two-factor authentication for a global workforce. Companies can revoke and recover software tokens when someone leaves the company or loses a device, eliminating the need to replace tokens.
For three decades, SecurID tokens have been synonymous with the RSA brand. As technology has advanced, end-user needs have evolved and RSA has grown its authentication portfolio to meet these needs. We released the first RSA SecurID software token in 2002 and have steadily supported the latest mobile technologies since then.
SecurID Software Tokens leverage the same algorithm as the RSA SecurID hardware token. Instead of being stored in hardware, the software token symmetric key is secured on the user's personal computer (PC), smart phone, or USB device.
Over 400 Technology Integrations
Leverage the more than 400 fully supported technology integrations offered with the RSA Ready Partner Program. RSA's technology integrations are available for a wide range of applications, free of charge. SecurID technology integrations are jointly tested by both organizations and documented to ensure a positive customer experience.
- Tech-savvy users
- Mobile warriors
- Employees on the go
- Third-party integration
Offerings for Mobile Devices
RSA Software Authenticators support the most popular smartphones and tablets.
RSA SecurID Software Token for Android
Leverage Android smartphones in your organization for two-factor authentication.
RSA SecurID Software Token for BlackBerry 10
Leverage mobile two-factor authentication with RSA SecurID Software Token for Blackberry 10.
RSA SecurID Software Token for BlackBerry
Leverage Blackberry smartphones in your organization for two-factor authentication.
RSA SecurID Software Token for iOS
Leverage Apple iOS devices in your organization for two-factor authentication.
RSA SecurID Software Token for Windows Phone
Leverage Windows Phone devices in your organization for two-factor authentication.
RSA SecurID Mobile Software Development Kit (SDK)
Seamlessly integrate strong one-time password (OTP) into mobile applications.
RSA SecurID Software Token Converter
Convert a software token exported as an SDTID file to a compressed token format (CTF) string and deliver it to mobile device platforms via e-mail.
Offerings for Laptops and Desktops
RSA Software Authenticators support the most popular PC platforms.
RSA SecurID Software Token for Mac OS X
Leverage MAC OS X devices in your organization for two-factor authentication.
RSA SecurID Software Token for Microsoft Windows
Leverage Microsoft Windows devices in your organization for two-factor authentication.
Offerings for Web Browsers
RSA SecurID Toolbar
Integrate RSA SecurID authentication into Microsoft Internet Explorer for two-factor authentication.
Centrally manage two-factor authentication functions, security tokens, methods, and users across the enterprise.
Direct requests for remote access and other authentication from secure applications to RSA Authentication Manager.
RSA SecurID Risk-Based Authentication is a tokenless, multi-factor enterprise authentication solution that uses risk scoring to determine that users are who they say they are while preserving the username and password login experience.
Protect your high value applications with the industry’s highest-quality, two-factor authentication device. Gain two-factor authentication, hard-disk encryption, email and transaction signing capabilities—with just one token.