RSA IGL Datareach - FAQ

Document created by Mohit Verman Employee on Aug 17, 2020Last modified by Pradeep Kadambar on Sep 28, 2020
Version 6Show Document
  • View in full screen mode

Sales Questions

How do I find out more?Please contact your local sales team or email: rsa.identity.ps.global.mailbox@rsa.com
I am only a small customer, can I still take advantage of this service?Yes absolutely, regardless of your company size, RSA Data Reach can add value. Please contact us to discuss your use case and book in a demo.

Does RSA Data Reach come with maintenance or a support contract? 

Yes, RSA Data Reach follows the Custom Application Support (CAS) model.

If you have any questions, please contact us: rsa.identity.ps.global.mailbox@rsa.com

QuestionAnswer

 

General Questions

Is Data Reach a replacement for OEM StealthAudit?Data Reach is intended to be a complementing solution to OEM StealthAudit. While OEM StealthAudit mainly focuses on unstructured data, Data Reach handles structured data from databases, Windows and UNIX systems.
Is Data Reach included as part of RSA IGL?No, Data Reach is a separately licensed product.
How long does it take to get started?On average, anything from 2 days, you can be started and running
How will RSA Data Reach help me to reduce identity risk?

If you have any questions, please contact us: rsa.identity.ps.global.mailbox@rsa.com 

QuestionAnswer

Technical Questions

What version of RSA IGL is required to run RSA Data Reach?Data Reach supports all version of RSA IGL currently supported by RSA.
What endpoints are supported with RSA Data Reach?Data Reach supports any JDBC compliant database, an SSH enabled UNIX/Linux systems and Windows Remote Management (WinRM) enabled Windows Servers.
When I upgrade RSA IGL, do I also need to upgrade RSA Data Reach?No, RSA IGL version upgrades or patching does not require an upgrade to Data Reach.
Can RSA Data Reach be run on AWS/Azure?Yes, Data Reach can be deployed on any Linux operating system. If deployed on AWS or Azure, the Data Reach agents must have a network path to the target systems.

If you have any questions, please contact us: rsa.identity.ps.global.mailbox@rsa.com

QuestionAnswer

Attachments

    Outcomes