Skip to content

RSAC Conference is the premiere series of global events and year-round learning for the cybersecurity community. During RSAC 2025, RSA Security announced groundbreaking identity security capabilities and shared best practices for implementing passwordless authentication solutions.

Read on for further information about the capabilities that RSA announced at RSAC 2025. And make sure to join us at RSAC 2026 from March 23-26 in San Francisco at the Moscone Center.

Secure your Help Desk with passwordless, phishing-resistant authentication

Your help desk needs help. The Marks & Spencer, Co-Op, Christian Dior, and MGM data breaches have shown just how vulnerable the Help Desk can be to social engineering—and how costly Help Desk breaches can be.

RSA Help Desk Live Verify protects help desks from social engineering, phishing, and ransomware. By using passwordless, bi-directional identity verification, RSA Help Desk Live Verify can help IT help desk ensure that they’re assisting legitimate users, and can help users stop technical support scams before they start.

Watch this demo video to see how RSA Help Desk Live Verify secures organizations:

Watch more RSA Help Desk Live Verify demo videos now to see how the solution secures users on location and protects users from cybercriminals posing as IT personnel.

Complete, enterprise-grade passwordless solutions

RSA® ID Plus supports passwordless authentication solutions—including QR codes, biometrics, FIDO2-certified hardware– and software-based authentication for iOS and Android, mobile push, and more—for every user, environment, and device.
At RSAC, RSA announced additional security innovations that enhance our passwordless offerings, including:

  • New RSA Mobile Lock enhancements protect against app tampering, spyware, sideloading, jailbreaking, and AiTM attacks, helping secure passkeys and all authentication methods on both BYOD and managed devices.
  • Windows Desktop Logon enables new passwordless methods, like QR code scanning and mobile FIDO logon for Windows desktops.
  • Secure onboarding with ID Verification uses government ID, liveness detection, and Mobile Match to prevent deepfake-based fraud and ensure the person enrolling owns the phone being used.
RSA Governance & Lifecycle adds ISPM capabilities to find and resolve risks

At RSAC, RSA announced that its identity governance and administration solution, RSA® Governance & Lifecycle, will now include identity security posture management (ISPM) capabilities that will provide organizations with the visibility and insights they need to find, prioritize, and resolve identity risks.

  • Unparalleled visibility: Advanced dashboards offer a comprehensive view of identity risk across your entire environment, enabling organizations to take proactive measures to secure resources, reduce their attack surface, and prevent breaches before they happen.
  • Actionable insights for everyone: Dashboards visualize complex data for admins, business leaders, and executives to coordinate and prioritize action.
  • Easier, continuous compliance: New RSA Governance & Lifecycle ISPM capabilities make it easy to surface the evidence auditors need, highlight areas that require attention, and reveal opportunities to reduce risk—all while aiding with GDPR, SOX, ISO 27001, SOC 2, and other compliance initiatives.

Watch our video to see how RSA Governance & Lifecycle uses ISPM to minimize the attack surface with visibility into enterprise-wide identity risk:

RSA and Microsoft Edge for Business Integration

The new RSA integration for Microsoft Edge for Business enables security teams to evaluate device trustworthiness in real-time and enforce security policies dynamically. This latest announcement expands on RSA’s work to extend passwordless authentication beyond where Microsoft’s capabilities end.

Watch our demo video to see how RSA ID Plus adapts access for trusted Microsoft Edge for Business browsers and untrusted browsers:

Learn from RSA CISO on best practices for implementing passwordless authentication

At RSAC 2025, RSA CISO Rob Hughes detailed best practices for how organizations can implement secure passwordless authentication. During his presentation, Rob discussed how to:

  • Deploy secure passwordless with Microsoft Entra and alongside other third-party technologies across environments
  • Deploy secure passwordless with Microsoft Entra and alongside other third-party technologies across environments
  • Deploy passwordless in a way that secures the entire identity lifecycle

Watch the video now to learn more about why organizations are implementing passwordless authentication and best practices for deploying passwordless at scale: