CyberArk Enterprise Password Vault, a component of the CyberArk Privileged Account Security Solution, is designed to automatically secure, rotate and control access to privileged account passwords, based on flexible organizational policies.

RSA SecurID Access secures the CyberArk Enterprise Password Vault with multi-factor authentication (MFA) to ensure only appropriate users are able to access these highly sensitive resources.

With RSA SecurID Access you can add three layers of controls to enhance the overall security of your privileged access:

  • Establish robust access policies to strengthen your organization’s security posture.
  • Apply the most trusted multi-factor authentication solution and give your privileged users choice among a wide range of authenticators, including hardware and software tokens, biometrics, push to approve and more.
  • Leverage risk and behavioral analytics to identify unusual access attempts requiring step-up authentication.
Lock Down Privileged Access

Make access decisions smarter. RSA provides identity assurance: It confirms users are who they say they are by considering the sensitivity of the resources they’re trying to access and the level of risk associated with the user’s access attempts. For example, if an access attempt seems suspicious based on behavioral indicators, it may trigger step-up authentication. But if the access attempt follows a user’s typical patterns, RSA SecurID Access may provide seamless access in accordance with an organization’s policies.

Implementation Options

Whether you’re an existing or first-time user of RSA SecurID Access, we have options for you:

  1. Extend additional hardware and software tokens to existing RSA SecurID Access Authentication Manager implementations via out-of-the-box certified RADIUS integration.
  2. Enable mobile authenticators and dynamic risk and behavioral analytics (e.g., push to approve, device biometrics, etc.) utilizing RSA Cloud Authentication Service.

Subscribe to our Blog!

Sign up to receive news, promotions and updates from RSA. 
Get the latest on cybersecurity and industry trends.
Subscribe to Blog