SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Do you really know who's accessing your most sensitive networked information assets? If you’re using
security built on static, reusable passwords, you could be a sitting duck for hackers. For businesses with
PCI or HIPAA compliance requirements or that need secure remote administration or end-user access,
two-factor authentication is a key piece of maintaining compliance and system security. Rackspace
Two-Factor Authentication provides better assurance that authorized users are positively identified before
they interact with mission-critical data and applications, whether through client-based VPN or web-based
SSL VPN.
How It Works
Each RSA Authenticator token automatically generates a unique password every 60 seconds. Two-factor
authentication requires users to enter something they know (a unique PIN) and something they have
(the authenticator token password) — providing a much more reliable level of user authentication than
solely relying on reusable passwords.
Rackspace® Two-Factor Identification Options
Choose between the RSA SecurID® Appliance 130 or the 250:
• RSA SecurID Appliance 130 for simple, cost-effective deployments in companies of any size,
including single-replica, high-availability (HA) deployments.
• RSA SecurID Appliance 250 with dual power and redundant discs for organizations that
require large, HA deployments (up to 15 replicas).
Once you’ve chosen your SecurID Appliance, you can purchase RSA Authenticator tokens in 10, 25, 50,
100, 150, or 250 token bundles. Additional user licenses and tokens can be added to the appliances for
an additional cost at any time.
Rackspace and RSA
Two-factor Authentication from Rackspace is powered by industry-leading RSA SecurID technology,
with a 20-year history of outstanding performance and innovation.
A team of Rackspace CCSP- and RSA-certified professionals fully manage your dedicated RSA SecurID
appliance and Authenticator tokens.
Copyright © Rackspace Hosting, Inc. | All trademarks, service marks, images, products and brands remain the sole property of their respective holders. | MODIFIED DATE: 02282011
Toll Free: 1.800.961.2888 | International: 1.210.312.4700 | www.rackspace.com
RACKSPACE®
HOSTING | 5000 WALZEM ROAD | SAN ANTONIO, TX 78218 U.S.A.
Secure, remote access for high security needs.
RSA VPN Two-Factor Authentication

Contenu connexe

Tendances

vArmour - Securing the Modern Data Centre
vArmour - Securing the Modern Data CentrevArmour - Securing the Modern Data Centre
vArmour - Securing the Modern Data CentreInfront
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODCisco Canada
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Cloudera, Inc.
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014Cloudera, Inc.
 
Code to-cloud toolchain-LA OpenStack meet up-20140626
Code to-cloud toolchain-LA OpenStack meet up-20140626Code to-cloud toolchain-LA OpenStack meet up-20140626
Code to-cloud toolchain-LA OpenStack meet up-20140626aedocw
 
Oracle database 12c data masking and subsetting guide
Oracle database 12c data masking and subsetting guideOracle database 12c data masking and subsetting guide
Oracle database 12c data masking and subsetting guidebupbechanhgmail
 
SAXOTECH Managed Hosting
SAXOTECH Managed HostingSAXOTECH Managed Hosting
SAXOTECH Managed Hostingwebhostingguy
 
Softlayer Technologies texasipv6taskforce
Softlayer Technologies texasipv6taskforceSoftlayer Technologies texasipv6taskforce
Softlayer Technologies texasipv6taskforceSoftLayer Technologies
 
Chalkline Microsoft Webinar about Windows Virtual Desktop
Chalkline Microsoft Webinar about Windows Virtual DesktopChalkline Microsoft Webinar about Windows Virtual Desktop
Chalkline Microsoft Webinar about Windows Virtual DesktopArticulate Marketing
 
OmniAccess_8550_Datasheet
OmniAccess_8550_DatasheetOmniAccess_8550_Datasheet
OmniAccess_8550_DatasheetJulien Kirsch
 
Seguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloudSeguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloudNextel S.A.
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Canada
 
A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...
A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...
A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...Ben Stricker
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Canada
 
SoftLayer overview for Telx CBX Jun10 Final
SoftLayer overview for Telx CBX Jun10 FinalSoftLayer overview for Telx CBX Jun10 Final
SoftLayer overview for Telx CBX Jun10 FinalSoftLayer Technologies
 
How to get started with Oracle Cloud Infrastructure
How to get started with Oracle Cloud InfrastructureHow to get started with Oracle Cloud Infrastructure
How to get started with Oracle Cloud InfrastructureSimo Vilmunen
 

Tendances (20)

vArmour - Securing the Modern Data Centre
vArmour - Securing the Modern Data CentrevArmour - Securing the Modern Data Centre
vArmour - Securing the Modern Data Centre
 
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
 
Build Your Own Cloud (BYOC) FAQ
Build Your Own Cloud (BYOC) FAQBuild Your Own Cloud (BYOC) FAQ
Build Your Own Cloud (BYOC) FAQ
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014
 
Code to-cloud toolchain-LA OpenStack meet up-20140626
Code to-cloud toolchain-LA OpenStack meet up-20140626Code to-cloud toolchain-LA OpenStack meet up-20140626
Code to-cloud toolchain-LA OpenStack meet up-20140626
 
TFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary HemmingerTFI2014 Session I - State of SDN - Gary Hemminger
TFI2014 Session I - State of SDN - Gary Hemminger
 
Oracle database 12c data masking and subsetting guide
Oracle database 12c data masking and subsetting guideOracle database 12c data masking and subsetting guide
Oracle database 12c data masking and subsetting guide
 
SAXOTECH Managed Hosting
SAXOTECH Managed HostingSAXOTECH Managed Hosting
SAXOTECH Managed Hosting
 
Softlayer Technologies texasipv6taskforce
Softlayer Technologies texasipv6taskforceSoftlayer Technologies texasipv6taskforce
Softlayer Technologies texasipv6taskforce
 
Chalkline Microsoft Webinar about Windows Virtual Desktop
Chalkline Microsoft Webinar about Windows Virtual DesktopChalkline Microsoft Webinar about Windows Virtual Desktop
Chalkline Microsoft Webinar about Windows Virtual Desktop
 
OmniAccess_8550_Datasheet
OmniAccess_8550_DatasheetOmniAccess_8550_Datasheet
OmniAccess_8550_Datasheet
 
Seguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloudSeguridad: sembrando confianza en el cloud
Seguridad: sembrando confianza en el cloud
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 
Introduction to RTI DDS
Introduction to RTI DDSIntroduction to RTI DDS
Introduction to RTI DDS
 
A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...
A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...
A10 Networks Brings Brawn to Stop Multi-Vector DDoS Disruption with Expanded ...
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
 
SoftLayer overview for Telx CBX Jun10 Final
SoftLayer overview for Telx CBX Jun10 FinalSoftLayer overview for Telx CBX Jun10 Final
SoftLayer overview for Telx CBX Jun10 Final
 
How to get started with Oracle Cloud Infrastructure
How to get started with Oracle Cloud InfrastructureHow to get started with Oracle Cloud Infrastructure
How to get started with Oracle Cloud Infrastructure
 
Rackspace
RackspaceRackspace
Rackspace
 

En vedette

Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presentionrodrida1
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureSecureAuth
 

En vedette (6)

Sms based otp
Sms based otpSms based otp
Sms based otp
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
January 2016 VASCO Investor Presention
January 2016 VASCO Investor PresentionJanuary 2016 VASCO Investor Presention
January 2016 VASCO Investor Presention
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
 

Similaire à Secure remote access with RSA 2FA

10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
RSASecureID (2).ppt
RSASecureID (2).pptRSASecureID (2).ppt
RSASecureID (2).pptPepeMartin23
 
Enterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveEnterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveAnusha Vaidyanathan
 
Stack Harbor - Services & Overview
Stack Harbor - Services & Overview Stack Harbor - Services & Overview
Stack Harbor - Services & Overview Wendy Ferdais
 
Stack Harbor - Services & Overview
Stack Harbor - Services & Overview Stack Harbor - Services & Overview
Stack Harbor - Services & Overview Marco K
 
Array Networks Corporate Overview
Array Networks Corporate OverviewArray Networks Corporate Overview
Array Networks Corporate OverviewYancey Gordon
 
Stack Harbor cloud services in Canada and US
Stack Harbor cloud services in Canada and USStack Harbor cloud services in Canada and US
Stack Harbor cloud services in Canada and USMarco-stackharbor
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
ClearPass_Design Info.pptx
ClearPass_Design Info.pptxClearPass_Design Info.pptx
ClearPass_Design Info.pptxssuser63c018
 
Wp cipher graph-cag-topology
Wp cipher graph-cag-topologyWp cipher graph-cag-topology
Wp cipher graph-cag-topologyIRSHAD RATHER
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTWD Industries AG
 
rsa_authentication_manager_8.6_administrators_guide.pdf
rsa_authentication_manager_8.6_administrators_guide.pdfrsa_authentication_manager_8.6_administrators_guide.pdf
rsa_authentication_manager_8.6_administrators_guide.pdfBarCode7
 
AVX Series Network Functions Platform
AVX Series Network Functions PlatformAVX Series Network Functions Platform
AVX Series Network Functions PlatformYancey Gordon
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkErni Susanti
 
VIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAYVIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAY Array Networks
 

Similaire à Secure remote access with RSA 2FA (20)

10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
RSASecureID.ppt
RSASecureID.pptRSASecureID.ppt
RSASecureID.ppt
 
RSASecureID (2).ppt
RSASecureID (2).pptRSASecureID (2).ppt
RSASecureID (2).ppt
 
Enterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveEnterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's Perspective
 
Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
 
Stack Harbor - Services & Overview
Stack Harbor - Services & Overview Stack Harbor - Services & Overview
Stack Harbor - Services & Overview
 
Stack Harbor - Services & Overview
Stack Harbor - Services & Overview Stack Harbor - Services & Overview
Stack Harbor - Services & Overview
 
Array Networks Corporate Overview
Array Networks Corporate OverviewArray Networks Corporate Overview
Array Networks Corporate Overview
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
Stack Harbor cloud services in Canada and US
Stack Harbor cloud services in Canada and USStack Harbor cloud services in Canada and US
Stack Harbor cloud services in Canada and US
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
ClearPass_Design Info.pptx
ClearPass_Design Info.pptxClearPass_Design Info.pptx
ClearPass_Design Info.pptx
 
Wp cipher graph-cag-topology
Wp cipher graph-cag-topologyWp cipher graph-cag-topology
Wp cipher graph-cag-topology
 
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud ServicesTrustLeap Multipass - Unbreakable Passwords For Cloud Services
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
 
rsa_authentication_manager_8.6_administrators_guide.pdf
rsa_authentication_manager_8.6_administrators_guide.pdfrsa_authentication_manager_8.6_administrators_guide.pdf
rsa_authentication_manager_8.6_administrators_guide.pdf
 
AVX Series Network Functions Platform
AVX Series Network Functions PlatformAVX Series Network Functions Platform
AVX Series Network Functions Platform
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Nagabhushana Rao P
Nagabhushana Rao PNagabhushana Rao P
Nagabhushana Rao P
 
VIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAYVIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAY
 
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
 

Plus de Hai Nguyen

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Hai Nguyen
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationHai Nguyen
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseHai Nguyen
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationHai Nguyen
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseHai Nguyen
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013Hai Nguyen
 
9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808Hai Nguyen
 

Plus de Hai Nguyen (20)

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Gambling
GamblingGambling
Gambling
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Csd6059
Csd6059Csd6059
Csd6059
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Bi guardotp
Bi guardotpBi guardotp
Bi guardotp
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013
 
9697 aatf sb_0808
9697 aatf sb_08089697 aatf sb_0808
9697 aatf sb_0808
 

Secure remote access with RSA 2FA

  • 1. Do you really know who's accessing your most sensitive networked information assets? If you’re using security built on static, reusable passwords, you could be a sitting duck for hackers. For businesses with PCI or HIPAA compliance requirements or that need secure remote administration or end-user access, two-factor authentication is a key piece of maintaining compliance and system security. Rackspace Two-Factor Authentication provides better assurance that authorized users are positively identified before they interact with mission-critical data and applications, whether through client-based VPN or web-based SSL VPN. How It Works Each RSA Authenticator token automatically generates a unique password every 60 seconds. Two-factor authentication requires users to enter something they know (a unique PIN) and something they have (the authenticator token password) — providing a much more reliable level of user authentication than solely relying on reusable passwords. Rackspace® Two-Factor Identification Options Choose between the RSA SecurID® Appliance 130 or the 250: • RSA SecurID Appliance 130 for simple, cost-effective deployments in companies of any size, including single-replica, high-availability (HA) deployments. • RSA SecurID Appliance 250 with dual power and redundant discs for organizations that require large, HA deployments (up to 15 replicas). Once you’ve chosen your SecurID Appliance, you can purchase RSA Authenticator tokens in 10, 25, 50, 100, 150, or 250 token bundles. Additional user licenses and tokens can be added to the appliances for an additional cost at any time. Rackspace and RSA Two-factor Authentication from Rackspace is powered by industry-leading RSA SecurID technology, with a 20-year history of outstanding performance and innovation. A team of Rackspace CCSP- and RSA-certified professionals fully manage your dedicated RSA SecurID appliance and Authenticator tokens. Copyright © Rackspace Hosting, Inc. | All trademarks, service marks, images, products and brands remain the sole property of their respective holders. | MODIFIED DATE: 02282011 Toll Free: 1.800.961.2888 | International: 1.210.312.4700 | www.rackspace.com RACKSPACE® HOSTING | 5000 WALZEM ROAD | SAN ANTONIO, TX 78218 U.S.A. Secure, remote access for high security needs. RSA VPN Two-Factor Authentication