RSA to Access Mid-Sized BusinessesRSA to Access Mid-Sized Businesses
RSA's new Access Manager 6.0 is aimed at organizations under the compliance microscope
June 12, 2006

Geisinger Health System is just the type of organization RSA Security had in mind for its RSA Access Manager 6.0, which was launched today.
The nonprofit healthcare company, which serves 40 counties in Pennsylvania and currently runs RSA Access Manager 5.5, is about to beta-test 6.0 as part of its ongoing effort to stay HIPAA-compliant. Geisinger is especially interested in 6.0's ability to delegate administration of users signing onto its external and internal sites, says David Young, Geisinger's IT program manager.
Leif Sundeen, senior product manager for RSA, says RSA is going after mid-sized organizations under regulatory compliance and scalability pressure with the new version of its RSA Access Manager. That includes regional banks, healthcare organizations, and enterprise service providers, Sundeen says, since most large enterprises have already set up their user access management tools.
Aside from the hierarchical delegated administration feature, Access Manager 6.0 also comes with enhanced policy rules, Simple Network Management Protocol (SNMP)-based instrumentation and health monitoring, interoperability with Microsoft Active Directory, expanded logging, an enhanced GUI, and support for 64-bit server platforms.
"Our number one concern is privacy and security," Geisinger's Young says. Young says RSA Access Manager 6.0's new SNMP-based instrumentation server, which monitors and measures how well Access Manager is actually performing, will help the healthcare company pinpoint problems such as why a user can't log onto its Website.
— Kelly Jackson Higgins, Senior Editor, Dark Reading
Companies mentioned in this article:
RSA Security Inc. (Nasdaq: EMC)
Microsoft Corp. (Nasdaq: MSFT)
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023