• slide
  • slide

Overview

RSA Provides Mission Critical Cybersecurity Capabilities Across the Federal Government

RSA, the Security Division of EMC, is the premiere provider of intelligence-driven security solutions to the Federal government, serving every cabinet level agency, each military service, and the intelligence community. Every day, RSA serves the mission of government, helping solve the most complex and sensitive security challenges:

  • Defending against advanced threats
  • Managing organizational risk
  • Safeguarding access and collaboration
  • Preventing web-based fraud

RSA delivers agile controls for identity assurance, fraud detection, and data protection; robust Security Analytics and industry-leading governance, risk and compliance (GRC) capabilities; and expert consulting and advisory services, including time-critical breach response services.

  • An Intelligence-Driven Approach

    RSA’s Intelligence Driven Security capabilities help organizations mitigate the risk of operating in a digital world by enabling them to detect, investigate, and respond to advanced threats; confirm and manage identities; and prevent web-based fraud and cybercrime.

    The benefits are significant. An Intelligence-Driven approach is risk-driven, incremental, achievable, future proof, and agile.

  • RSA Solutions for Government From Carahsoft: Advanced Security Options

    Security Operations Centers (SOCs) need collaborative, cross-disciplinary teams with highly specialized skill sets to combat advanced cyber threats. RSA provides professional services and products to help you build a best-in-class SOC:

    • RSA’s Advanced Cyber Defense Practice provides a range of solutions to help agencies protect their mission, drive operational efficiencies, and evolve with a dynamic threat environment. RSA’s Enterprise Compromise Assessment Tool (ECAT) is an enterprise threat-detection and response solution designed to monitor and protect IT environments from undesirable software and the most elusive malware.
    • RSA’s Security Analytics suite is designed to provide security organizations with the situational awareness needed to deal with their most pressing security issues.
  • Governnance, Risk & Compliance

    RSA’s Archer GRC suite provides you with clear visibility into all of the risks that your organization needs to manage, giving you confidence that your compliance posture and your security posture are optimally managed. RSA Archer provides a capability that helps you manage risk and compliance use-cases across the business. Get a holistic view across the organization in rolled-up, actionable reporting that brings all of this information together for executive leaders.

  • Intelligence-Driven Continuous Monitoring

    The RSA Archer Continuous Monitoring (CM) solution is purpose built to meet the needs of federal agencies by providing mission critical capabilities essential to every Information Assurance (IA) Continuous Monitoring program. Archer offers next-generation CM/CMaaS features today:

    • Near real time visibility into the security posture of every device in the enterprise
    • Manage with risk-based approach by prioritizing security risk data and focusing on “worst first”
    • Maintain a common operational cyber landscape with aggregation and correlation of data and stay current with latest requirements
    • Real time alerting capabilities, advanced reporting, and dashboards at multiple levels of the organization
    • Protect infrastructure across network endpoint such as laptops, desktop computers, and servers
    • Protect sensitive information while continually providing essential services.
    • Track and report compliance across vulnerabilities, configurations, assets, and applications
    • Leverage, maximize, and utilize existing and new agency infrastructure CDM tools
  • Identity & Access Management

    The critically sensitive data, systems, devices, and facilities that the Federal government necessarily utilizes combine to create an environment uniquely susceptible to unauthorized access. RSA’s Identity solutions help provide the market leading capabilities you need to:

    • Build trust in your identity ecosystem.
    • Know your users and how they interact with your systems.
    • Leverage identity intelligence across your security program.
    • Provide ease and flexibility for the end user.
  • Fraud & Risk Intelligence

    Despite the security measures taken by most organizations, fraud and misuse continue to increase at alarming rates. RSA’s Fraud and Risk Intelligence Suite offers a complete portfolio of strong authentication and anti-fraud technologies designed to help organizations:

    • Manage the overall risk of remote channel activities and transactions.
    • Inspire user confidence through enhanced protection.
    • Mitigate the risk of cybercrime, fraud, misuse and identity theft.

Products

RSA Mission Driven Security

RSA’s mission-driven security solutions help customers comprehensively and rapidly link security incidents with mission context to respond effectively and protect what matters most. With award-winning solutions for rapid detection and response, identity and access assurance, consumer fraud protection, and mission risk management, RSA customers can thrive in an uncertain, high-risk world. It’s time for Mission-Driven Security.


RSA NetWitness® Suite
Triple the impact of your existing security team


RSA SecurID® Suite
Accelerate your mission while mitigating identity risks


RSA® Fraud and Risk Intelligence Suite
Act at the speed of fraud


RSA Archer® Suite
Know which Risk is Worth Taking


RSA SecurID® Access Test Drive
Start your Free Trial Today!


Contact Carahsoft Technology Corp about RSA Solutions | 703-230-7419

Count on Carahsoft

Count-on-Carahsoft.jpg

RSA SecurID Access provides a solution for maintaining a consistent multi-factor authentication policy during a business emergency, when large numbers of users may be required to work remotely for a period of time, enhancing the security of your organization by ensuring that your business user identities are assured and access to critical applications and data remain intact.

 

Free-Business-Continuity-Option.jpg

RSA is offering Business Continuity Option (BCO) to current customers free of charge to provide a flexible method to expand the number of users in an organization without expanding their multi-factor authentication (MFA) budget. For new customers, we are offering RSA SecurID Access at no charge for a limited time. For more information contact us at 800-340-9194 or rsa@carahsoft.com.

 

Resources.jpg

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2016

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2020

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Dec 19, 2016

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2016

Department of General Services PA - Symantec

4400004253
May 01, 2009- Jun 17, 2017

Fairfax County IT Hardware, Software, & Services

4400006323
Oct 04, 2015- Oct 04, 2020

Oklahoma DIR Contract # SW1056B

SW1056B
Jun 28, 2017- Jun 28, 2019

Pennsylvania COSTARS-6 IT Software Contract

COSTARS-006-176
Aug 31, 2017- Aug 31, 2019

State of Alabama Cloud Solutions Contract- NASPO

MA 999 190000000277
Jun 10, 2019- Sep 16, 2026
*Additional Option Years Available

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2019

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Texas DIR-TSO-3926

DIR-TSO-3926
Jun 28, 2017- Jun 28, 2019

Texas DIR-TSO-4288

DIR-TSO-4288
Feb 22, 2019- Feb 21, 2021

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022
*Additional Option Years Available

The Quilt

MSA - 05012019F
Apr 01, 2016- Mar 31, 2019

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2016

Events

Archived Events

News

Latest News

New features, recommended best practices and implementation service offerings simplify day-to-day governance, decrease time to value, and reduce identity risk.
READ MORE >
Carahsoft Technology Corp., The Trusted Government IT Solutions Provider™, today announced that it is expanding its distribution agreement with RSA, a global cybersecurity leader delivering ...
READ MORE >

Resources

Blog

Today, the need for risk management in government has grown along with agencies’ digital footprints. That’s because the more complex the environment, the more vulnerable it may become.

Datasheet

Protection and peace of mind during a time of business disruption

RSA Identity Lifecycle simplifies and automates how user access is delivered. By combining a business-friendly interface for access request and approval with an innovative approach to automating user access changes across all target systems, organizations can deliver business agility while lowering ...

RSA Identity Governance simplifies how user access is governed across the enterprise, making it possible to achieve sustainable compliance by fully automating the monitoring, reporting, certification, and remediation of user entitlements.

In many cases, federal agencies could use multiple approaches to secure applications. Each resource is working to protect access to its assigned area, but most often lacks centralized visibility, a convenient user experience, and a consistent approach to authentication policies and procedures. To ad...

RSA Archer® Third-Party Security Risk Monitoring powered by RiskRecon delivers transparent security measurements, analytics, and analyst-level insight to dramatically improve your third-party risk management program.

Leverage RSA to help maintain control of risk when moving to a multi-cloud environment.

Mature capabilities to control risk arising from third-party relationships with RSA Risk Frameworks.

E-Book

Business disruptions can catch us off guard. In a time of crisis, many organizations may not be entirely sure how to respond. After all, global and prolonged disruptions don’t come along every day. And when they do, they rarely have the profound personal and global implications we’ve seen i...

Learn how RSA NetWitness Suite addresses the log-centric SIEM problem in a very unique way in this eBook.