RSA extends security tools to VMware

Its authentication, monitoring and data-loss prevention tools all will work in virtualized environments

EMC's RSA division is embracing the virtualization trend that its VMware spinoff helped kick off, announcing Thursday that three of its core security products will work in VMware virtualized environments.

Enterprise users of RSA products are gradually migrating from purely physical to purely virtual computing and storage and will be operating hybrid environments for some time, said Sam Curry, chief technology officer of RSA's GTM (Go-To-Market) organization. They are moving toward the point where applications, data, virtual machines and people will all combine on the fly and software will have to ensure that each piece is added to the mix securely, he said.

On Thursday, RSA announced that its SecurID authentication product, enVision security monitoring software and DLP (Data Loss Prevention) Endpoint all work with VMware virtualized environments in their latest versions.

SecurID, a two-factor authentication system that requires an automatically generated passcode from a portable device, can now authenticate users who need to access virtual sessions on virtual desktops. Administrators can integrate SecurID into VMware View, vSphere Management Assistant and VMware ESX Service Console, RSA said.

RSA has extended the enVision SIEM (security information and event management) tool to gather information on events and administrator actions in both physical and virtual environments. It can report on both in the same set of controls. The events and actions that it can report on will help enterprises make security decisions and maintain compliance with their policies, RSA said. The enVision platform has a new collector component that can pick up more than 350 events from VMware, the company said. The SIEM platform works with both VMware View and VMware vSphere environments.

To prevent leaks of data from virtual desktops within a VMware View environment, RSA's DLP Endpoint can now discover sensitive information and enforce controls across desktop and laptop computers that are used to access virtual desktops, as well as on conventional PC-based operating systems. Administrators can configure policies for both types of clients from a central location, enforcing them with a variety of actions, such as blocking a user's access to certain data or notifying IT staff to manage activity, Curry said.

Also on Thursday, RSA announced that the latest version of SecurID and enVision have been validated to work with Vblock Infrastructure Packages, the pre-integrated data-center packages introduced last November by EMC, Cisco and VMware. Vblocks include virtualization, networking, computing, storage, security and management products from the three vendors, in tested and validated combinations.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Stephen Lawson

IDG News Service
Topics: security, virtualisation, VMware, emc, rsa
Comments are now closed.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?