Trust the authentication process

RSA Mobile Lock identifies security threats on mobile devices and can restrict new authentication requests, thereby securing access to protected resources. This capability enables organizations to establish trust by systematically validating mobile authentication throughout their IT estate while actively identifying threats.

Respond to threats

When a user attempts to authenticate, RSA Mobile Lock searches for threats on their mobile device; if a threat is detected, the authentication process is restricted and access to secure environments, including company data, enterprise systems, and customer records, is prevented. This proactive measure effectively contains threats, preventing them from spreading beyond a single compromised device and averting widespread consequences for an organization. Using the Mobile Lock console, organizations can easily customize and prioritize the list of threats they wish to detect and define the appropriate responses.

Minimize the impact on users

Given the prevalence of Bring Your Own Device (BYOD) policies today, it’s essential to consider how requirements to enforce corporate security on personal devices can potentially disrupt the user experience. RSA Mobile Lock minimizes this risk by seamlessly integrating into RSA Authenticator for iOS and Android, eliminating the need for a separate installation. Additionally, if Mobile Lock detects a threat, the solution only suspends the user’s ability to use RSA Authenticator, and maintains their ability to make calls, text, browse the internet, and use other device features.

RSA Mobile Lock: the workflow

RSA Mobile Lock protects the authentication process and stops mobile devices with security concerns from accessing valuable corporate assets. While not visible to users, Mobile Lock scans the device every time an authentication is attempted.

Subscribe to our Blog!

Sign up to receive news, promotions and updates from RSA. 
Get the latest on cybersecurity and industry trends.
Subscribe to Blog