RSA SecurID® Access Modern Authentication Methods

Modern Authentication Methods

< What it does >

Secures all applications from ground to cloud

Secures all applications from ground to cloud

RSA SecurID Access offers a broad range of authentication methods including mobile and embedded multi-factor authenticators (push notification, one-time password, SMS, biometrics, and more), as well as traditional hardware and software tokens (OTP, FIDO2/U2F). RSA also supports wearables and proximity-based authentication. Our portfolio of authenticators enables secure access to all applications, on premises and in the cloud.

Managing authenticators is easy with RSA’s identity assurance platform

Simplifies the user experience

Simplifies the user experience

Provides convenient and intuitive user experiences with authentication that auto-detects the capabilities of the end user’s device before prompting.

Securely enables ground to cloud access

Securely enables ground to cloud access

Simultaneously protects and allows access to more than 500 cloud-based and on-premises applications with out-of-the-box certified interoperability.

Supports your passwordless journey

Supports your passwordless journey

Reduce your organization’s dependency on passwords. Let us help you go passwordless strategically to enhance security and improve the user experience

Ensures administrative control

Ensures administrative control

Provides flexible authentication policies and simplifies management of authentication methods so organizations can balance administrative control and ease of use.

< Use cases >

Modern authentication methods to secure every user and every app

  • Authentication for Mac users

    RSA SecurID Access is the only authentication solution for macOS® that provides lots of quick, simple ways for Mac users to log in securely, even when they’re somewhere they can’t connect to your network. Push notification, one-time code and offline authentication methods deliver a seamless authentication experience anywhere.

  • FIDO2 for web apps

    Eliminate account takeovers and man in the middle attacks while simplifying the user experience. RSA is FIDO2 and FIDO U2F certified and supports embedded (Windows 10), software and hardware FIDO authenticators. RSA also offers the YubiKey for RSA SecurID Access, a hardware-based FIDO2 security key.

  • Authenticate App for mobile devices

    Remote or on the go, the RSA Authenticate App combines the benefits of mobility with the security of being in the office. With the Authenticate App, users can employ their mobile devices to authenticate with push notification, one-time password (OTP), SMS, biometrics, and more.

  • Software for fast onboarding

    RSA software authenticators use the same algorithm as RSA SecurID hardware authenticators, but they don’t require users to carry dedicated hardware devices. Instead of being stored in the hardware, the symmetric key is safeguarded on users’ PCs or USB devices. Administrators can quickly enable software authenticators, particularly during times of disruption.

  • Hardware for privileged access

    The gold standard in authentication, the RSA SecurID Access hardware token utilizes patented technology that synchronizes with the security server, ensuring a high level of security. This makes it an ideal solution for users who need access to highly sensitive applications or are unable to use mobile devices to protect IP or PII.

Manage digital risk by securing the weakest link

Manage digital risk by securing the weakest link

80% of hacking-related breaches involve compromised and weak credentials*, and workforces are becoming increasingly dynamic, making identity and access management increasingly difficult. Now, more than ever, ensuring the right user has the right access to the right applications is critical to managing digital risk. RSA SecurID Access provides peace of mind that the weakest link—user identities—is secured.

*Verizon 2019 Data Breach Investigations Report

RSA SecurID Access is a critical component of our security stack; not using it would mean we'd only be requiring a standard identification and password, and we saw that as potentially opening us up to targeted attacks and phishing attempts.

Yumiko Matsubara
Security Architecture Manager

Recruit Technologies Co., Ltd
Recruit Technologies

< Resources >

Discover more from RSA

Manage dynamic workforce risk

Manage dynamic workforce risk

Learn how RSA helps address the access risks of a dynamic workforce without inconveniencing users or hampering their productivity.

Manage workforce risk

Secure your cloud transformation

Secure your cloud transformation

Count on RSA to make securing user access to SaaS applications as easy as securing their access to on-premises resources.

Secure cloud access

Provide convenient access to any platform

Provide convenient access to any platform

Meet users’ access expectations with a variety of convenient RSA authentication options they can use securely from any platform, anywhere.

Deliver convenient access

Implement identity assurance

Implement identity assurance

See how RSA provides visibility and context to ensure users seeking access to resources are who they say they are.

Achieve identity assurance

RSA SecurID Access

Secure access to resources, made simple for users
RSA SecurID Access

Recommended for you