Log in to follow, share, and participate in this community. INTELLIGENT SOC WEBCAST SERIES: Threat Defense / Going Beyond Preventative Controls Details coming soon! Register Now INTELLIGENT SOC WEBCAST SERIES: UEBA as part of an Evolved SIEM Details coming soon! Register Now INTELLIGENT SOC WEBCAST SERIES: The Journey to an Intelligent SOC How do you begin your journey to an Intelligent SOC? Start by evaluating where your dimensions of visibility, analytics, automation, and... For years RSA has been in business of providing best-in-class security and Anti fraud products and services to you, our customers. I am proud to be surrounded by extremely intelligent and creative coworker... RSA Conference 2018 takes place April 16 to 20 in San Francisco! Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leader... What is the expected behavior of a whitelist.eds file? Is it just another EDS file or does it behave differently. Does WTD simply not fire rules for IPs in the whitelist or is the traffic completely ignore... In today’s hyper expansive and unpredictable market, it isn’t sufficient to be ‘just good enough’ when it comes to managing risk. Every day, in organizations around the globe, risk, compl... Delivering Authentication Your Way – Why One size No Longer Fits All in the Access Game Speaker: Murtaza Hafizji The market demands are more like “Have it your way!” for modern approach to authentica... Modernizing Authentication in and for the Cloud Speaker: Tony Karam Let’s face it — when it comes to moving applications and data to the cloud, enterprises want to streamline operations and deliver a... Identity Assurance for a Connected World Organizations need to provide convenient yet secure access so that users can get to the information they need regardless of whether the application is on premises o... Organizations need to provide convenient yet secure access so that users can get to the information they need regardless of whether the application is on premises or in the cloud. Modern approaches to access leverage ... The Future of Authentication in a Hyper Connected World (FOR ISC2 MEMBERS ONLY) ** With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authenticatio... Every asset on your network and in the cloud has privileged accounts – everything from network devices like routers and switches to server operating systems to the databases and applications on those servers and... With RSA Web Threat Detection v6.3, which is now generally available, we continue on our journey toward “run anywhere.” Web Threat Detection can be deployed on premises and can now be deployed on a public ... Attendees can earn 1 CPE credit on this session. The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by ... As identity theft and credential-based attacks escalate, organizations wonder how this can be when they're investing so much time and effort deploying identity and access management solutions. Despite their best effor... Hi, I've create a Rule in WTD and I would like to know if the email alert custom action can sent to more than one email address? for example, the following sends an alert email to one email address emai... We continuously have multiple tickets open for application issues and some are rolling over for a long time(with engineering). Where is the application road map, what is ahead of 6.2 to address known bugs... Integrated enterprise software applications have turn out to be essential to convert organizations against their disconnected purposeful systems that cause several issues of their commercial enterprise growth. these d... What is the recommended server sizing for application install and data storage with RSA WTD?