Security tokens for identity and access management
Protect sensitive data and mission-critical systems with the industry’s highest-quality two-factor authentication device. Gain two-factor authentication, hard disk encryption, email and transaction signing capabilities with a single hardware token.
For three decades, RSA SecurID tokens have been synonymous with performance and reliability. Today, the RSA SecurID hardware token comes in a pair of convenient models that all generate and display new codes every 60 seconds.
RSA SecurID hardware tokens are tamper resistant and designed to withstand extreme physical conditions including dramatic temperature variations, submersion in water and mechanical shock. An extended warranty protects RSA SecurID hardware tokens across the lifetime of the device.
Choose between two hardware token models: RSA SecurID 700 and RSA SecurID 800. Both keyfob style devices share similar features, though the RSA SecurID 800 has a USB and can be used for storing Windows® credentials and digital certificates.
RSA SecurID hardware tokens can be enabled for 24, 36, 48 or 60 months, depending on your organization's needs.
Both hardware token models are customizable: The six-digit display can be customized to show four digits, and one-time passwords can be set to change every 30 seconds from the standard 60 seconds. You can further customize your device by adding your organization’s logo.
Facilitate a range of functions, including two-factor authentication, hard disk encryption and email signing, with a single hardware token.
Reduce the cost of procuring, administering and managing hardware tokens. RSA SecurID hardware tokens consistently and reliably generate access codes and are known for their durability and long battery life. These qualities minimize the need for costly replacements, improve total cost of ownership and reduce calls to the helpdesk to address token-related problems.
RSA SecurID hardware tokens employ an authentication approach that combines time, the AES-128 algorithm and a unique identifier to strengthen cryptographic value. Established by the National Institute of Standards and Technology, the AES-128 algorithm was approved by the U.S. National Security Agency to protect classified information up to the level of secret.
Want a Demo?
Sign up for a free demo today and watch our products in action.