RSA to Access Mid-Sized BusinessesRSA to Access Mid-Sized Businesses
RSA's new Access Manager 6.0 is aimed at organizations under the compliance microscope
June 12, 2006
Geisinger Health System is just the type of organization RSA Security had in mind for its RSA Access Manager 6.0, which was launched today.
The nonprofit healthcare company, which serves 40 counties in Pennsylvania and currently runs RSA Access Manager 5.5, is about to beta-test 6.0 as part of its ongoing effort to stay HIPAA-compliant. Geisinger is especially interested in 6.0's ability to delegate administration of users signing onto its external and internal sites, says David Young, Geisinger's IT program manager.
Leif Sundeen, senior product manager for RSA, says RSA is going after mid-sized organizations under regulatory compliance and scalability pressure with the new version of its RSA Access Manager. That includes regional banks, healthcare organizations, and enterprise service providers, Sundeen says, since most large enterprises have already set up their user access management tools.
Aside from the hierarchical delegated administration feature, Access Manager 6.0 also comes with enhanced policy rules, Simple Network Management Protocol (SNMP)-based instrumentation and health monitoring, interoperability with Microsoft Active Directory, expanded logging, an enhanced GUI, and support for 64-bit server platforms.
"Our number one concern is privacy and security," Geisinger's Young says. Young says RSA Access Manager 6.0's new SNMP-based instrumentation server, which monitors and measures how well Access Manager is actually performing, will help the healthcare company pinpoint problems such as why a user can't log onto its Website.
— Kelly Jackson Higgins, Senior Editor, Dark Reading
Companies mentioned in this article:
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks