Trust the authentication processTranslated

RSA Mobile Lock identifies security threats on mobile devices and can restrict new authentication requests, thereby securing access to protected resources. This capability enables organizations to establish trust by systematically validating mobile authentication throughout their IT estate while actively identifying threats.Translated

Respond to threatsTranslated

When a user attempts to authenticate, RSA Mobile Lock searches for threats on their mobile device; if a threat is detected, the authentication process is restricted and access to secure environments, including company data, enterprise systems, and customer records, is prevented. This proactive measure effectively contains threats, preventing them from spreading beyond a single compromised device and averting widespread consequences for an organization. Using the Mobile Lock console, organizations can easily customize and prioritize the list of threats they wish to detect and define the appropriate responses.Translated

Minimize the impact on users Translated

Given the prevalence of Bring Your Own Device (BYOD) policies today, it’s essential to consider how requirements to enforce corporate security on personal devices can potentially disrupt the user experience. RSA Mobile Lock minimizes this risk by seamlessly integrating into RSA Authenticator for iOS and Android, eliminating the need for a separate installation. Additionally, if Mobile Lock detects a threat, the solution only suspends the user’s ability to use RSA Authenticator, and maintains their ability to make calls, text, browse the internet, and use other device features. Translated

RSA Mobile Lock: the workflowTranslated

RSA Mobile Lock protects the authentication process and stops mobile devices with security concerns from accessing valuable corporate assets. While not visible to users, Mobile Lock scans the device every time an authentication is attempted.Translated