Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

6/12/2006
09:50 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

RSA to Access Mid-Sized Businesses

RSA's new Access Manager 6.0 is aimed at organizations under the compliance microscope

Geisinger Health System is just the type of organization RSA Security had in mind for its RSA Access Manager 6.0, which was launched today.

The nonprofit healthcare company, which serves 40 counties in Pennsylvania and currently runs RSA Access Manager 5.5, is about to beta-test 6.0 as part of its ongoing effort to stay HIPAA-compliant. Geisinger is especially interested in 6.0's ability to delegate administration of users signing onto its external and internal sites, says David Young, Geisinger's IT program manager.

Leif Sundeen, senior product manager for RSA, says RSA is going after mid-sized organizations under regulatory compliance and scalability pressure with the new version of its RSA Access Manager. That includes regional banks, healthcare organizations, and enterprise service providers, Sundeen says, since most large enterprises have already set up their user access management tools.

Aside from the hierarchical delegated administration feature, Access Manager 6.0 also comes with enhanced policy rules, Simple Network Management Protocol (SNMP)-based instrumentation and health monitoring, interoperability with Microsoft Active Directory, expanded logging, an enhanced GUI, and support for 64-bit server platforms.

"Our number one concern is privacy and security," Geisinger's Young says. Young says RSA Access Manager 6.0's new SNMP-based instrumentation server, which monitors and measures how well Access Manager is actually performing, will help the healthcare company pinpoint problems such as why a user can't log onto its Website.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

Companies mentioned in this article:

  • RSA Security Inc. (Nasdaq: EMC)
  • Microsoft Corp. (Nasdaq: MSFT) Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    For Cybersecurity to Be Proactive, Terrains Must Be Mapped
    Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
    A Realistic Threat Model for the Masses
    Lysa Myers, Security Researcher, ESET,  10/9/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-17593
    PUBLISHED: 2019-10-14
    JIZHICMS 1.5.1 allows admin.php/Admin/adminadd.html CSRF to add an administrator.
    CVE-2019-17594
    PUBLISHED: 2019-10-14
    There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
    CVE-2019-17595
    PUBLISHED: 2019-10-14
    There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
    CVE-2019-14823
    PUBLISHED: 2019-10-14
    A flaw was found in the "Leaf and Chain" OCSP policy implementation in JSS' CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to...
    CVE-2019-17592
    PUBLISHED: 2019-10-14
    The csv-parse module before 4.4.6 for Node.js is vulnerable to Regular Expression Denial of Service. The __isInt() function contains a malformed regular expression that processes large crafted input very slowly. This is triggered when using the cast option.