Overview

RSA Provides Mission Critical Cybersecurity Capabilities Across the Federal Government

RSA, the Security Division of EMC, is the premiere provider of intelligence-driven security solutions to the Federal government, serving every cabinet level agency, each military service, and the intelligence community. Every day, RSA serves the mission of government, helping solve the most complex and sensitive security challenges:

  • Defending against advanced threats
  • Managing organizational risk
  • Safeguarding access and collaboration
  • Preventing web-based fraud

RSA delivers agile controls for identity assurance, fraud detection, and data protection; robust Security Analytics and industry-leading governance, risk and compliance (GRC) capabilities; and expert consulting and advisory services, including time-critical breach response services.

  • An Intelligence-Driven Approach

    RSA’s Intelligence Driven Security capabilities help organizations mitigate the risk of operating in a digital world by enabling them to detect, investigate, and respond to advanced threats; confirm and manage identities; and prevent web-based fraud and cybercrime.

    The benefits are significant. An Intelligence-Driven approach is risk-driven, incremental, achievable, future proof, and agile.

  • RSA Solutions for Government From Carahsoft: Advanced Security Options

    Security Operations Centers (SOCs) need collaborative, cross-disciplinary teams with highly specialized skill sets to combat advanced cyber threats. RSA provides professional services and products to help you build a best-in-class SOC:

    • RSA’s Advanced Cyber Defense Practice provides a range of solutions to help agencies protect their mission, drive operational efficiencies, and evolve with a dynamic threat environment. RSA’s Enterprise Compromise Assessment Tool (ECAT) is an enterprise threat-detection and response solution designed to monitor and protect IT environments from undesirable software and the most elusive malware.
    • RSA’s Security Analytics suite is designed to provide security organizations with the situational awareness needed to deal with their most pressing security issues.
  • Governnance, Risk & Compliance

    RSA’s Archer GRC suite provides you with clear visibility into all of the risks that your organization needs to manage, giving you confidence that your compliance posture and your security posture are optimally managed. RSA Archer provides a capability that helps you manage risk and compliance use-cases across the business. Get a holistic view across the organization in rolled-up, actionable reporting that brings all of this information together for executive leaders.

  • Intelligence-Driven Continuous Monitoring

    The RSA Archer Continuous Monitoring (CM) solution is purpose built to meet the needs of federal agencies by providing mission critical capabilities essential to every Information Assurance (IA) Continuous Monitoring program. Archer offers next-generation CM/CMaaS features today:

    • Near real time visibility into the security posture of every device in the enterprise
    • Manage with risk-based approach by prioritizing security risk data and focusing on “worst first”
    • Maintain a common operational cyber landscape with aggregation and correlation of data and stay current with latest requirements
    • Real time alerting capabilities, advanced reporting, and dashboards at multiple levels of the organization
    • Protect infrastructure across network endpoint such as laptops, desktop computers, and servers
    • Protect sensitive information while continually providing essential services.
    • Track and report compliance across vulnerabilities, configurations, assets, and applications
    • Leverage, maximize, and utilize existing and new agency infrastructure CDM tools
  • Identity & Access Management

    The critically sensitive data, systems, devices, and facilities that the Federal government necessarily utilizes combine to create an environment uniquely susceptible to unauthorized access. RSA’s Identity solutions help provide the market leading capabilities you need to:

    • Build trust in your identity ecosystem.
    • Know your users and how they interact with your systems.
    • Leverage identity intelligence across your security program.
    • Provide ease and flexibility for the end user.
  • Fraud & Risk Intelligence

    Despite the security measures taken by most organizations, fraud and misuse continue to increase at alarming rates. RSA’s Fraud and Risk Intelligence Suite offers a complete portfolio of strong authentication and anti-fraud technologies designed to help organizations:

    • Manage the overall risk of remote channel activities and transactions.
    • Inspire user confidence through enhanced protection.
    • Mitigate the risk of cybercrime, fraud, misuse and identity theft.

Products

RSA Mission Driven Security

RSA’s mission-driven security solutions help customers comprehensively and rapidly link security incidents with mission context to respond effectively and protect what matters most. With award-winning solutions for rapid detection and response, identity and access assurance, consumer fraud protection, and mission risk management, RSA customers can thrive in an uncertain, high-risk world. It’s time for Mission-Driven Security.


RSA NetWitness® Suite
Triple the impact of your existing security team


RSA SecurID® Suite
Accelerate your mission while mitigating identity risks


RSA® Fraud and Risk Intelligence Suite
Act at the speed of fraud


RSA Archer® Suite
Know which Risk is Worth Taking


RSA SecurID® Access Test Drive
Start your Free Trial Today!


Contact Carahsoft Technology Corp about RSA Solutions | 703-230-7419

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

NASPO ValuePoint

Term: through September 15, 2026

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2019 (with 2 option renewal years)

State of Indiana Contract

Contract Number: 0000000000000000000021430 Term: August 1, 2017 – July 31, 2021

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

Texas DIR-TSO-3926

Expiration Term: June 28, 2022 (with 3 option years)

Texas DIR-TSO-4288

Texas DIR Contract: DIR-TSO-4288 Contract Period: Through February 21, 2021 (with 2 option years)

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021


Education Contracts

The Quilt

The Quilt


Events

Upcoming Events

February 24, 2020 at 5:00 PM PT
February 24, 2020

Archived Events

News

Latest News

New features, recommended best practices and implementation service offerings simplify day-to-day governance, decrease time to value, and reduce identity risk.
READ MORE >
Carahsoft Technology Corp., The Trusted Government IT Solutions Provider™, today announced that it is expanding its distribution agreement with RSA, a global cybersecurity leader delivering ...
READ MORE >

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Datasheet

RSA Identity Lifecycle simplifies and automates how user access is delivered. By combining a business-friendly interface for access request and approval with an innovative approach to automating user access changes across all target systems, organizations can deliver business agility while lowering ...

RSA Identity Governance simplifies how user access is governed across the enterprise, making it possible to achieve sustainable compliance by fully automating the monitoring, reporting, certification, and remediation of user entitlements.

In many cases, federal agencies could use multiple approaches to secure applications. Each resource is working to protect access to its assigned area, but most often lacks centralized visibility, a convenient user experience, and a consistent approach to authentication policies and procedures. To ad...

RSA Archer® Third-Party Security Risk Monitoring powered by RiskRecon delivers transparent security measurements, analytics, and analyst-level insight to dramatically improve your third-party risk management program.

Leverage RSA to help maintain control of risk when moving to a multi-cloud environment.

Mature capabilities to control risk arising from third-party relationships with RSA Risk Frameworks.

E-Book

Learn how RSA NetWitness Suite addresses the log-centric SIEM problem in a very unique way in this eBook.

Learn about what an enterprise approach to risk management looks like in government today and why it’s necessary to support government’s digital future.

Resources

Across the federal government, there is an urgency to strengthen security by moving beyond password-only authentication regime. Download this resource to dive deeper into RSA SecurID and its case studies.

Security teams need to evolve to stay in front of attackers and the latest threats, but in recent years this has become much more difficult. Attackers continue to advance and use sophisticated techniques to infiltrate organizations which no longer have well defined perimeters. Attackers spend s...