project rhapsody
play

PROJECT RHAPSODY Credential Vault for Personal and Enterprise Use 1 - PowerPoint PPT Presentation

RSA LABS PROJECT RHAPSODY Credential Vault for Personal and Enterprise Use 1 WHAT IS RHAPSODY? A credential management service that allows individuals and employees to securely and seamlessly access any app from any device. 2 RHAPSODY


  1. RSA LABS PROJECT RHAPSODY Credential Vault for Personal and Enterprise Use 1

  2. WHAT IS RHAPSODY? A credential management service that allows individuals and employees to securely and seamlessly access any app from any device. 2

  3. RHAPSODY SYSTEM Enterprise Admin ARCHITECTURE Admin App Credential Management Services AD Enterprise Connector Mac OS Account iOS Windows Holder Android RSA Desktop RSA RSA Mobile App Native 3 rd Party App App Extension browser and 3 rd Party App Browser RSA SDK Chrome, FireFox, Safari, IE 3

  4. RHAPSODY BENEFITS For Individuals.. For Enterprises No longer a need to remember long and complex Simplified employee onboarding and application passwords provisioning Secure access to both personal and enterprise Improved security without compromising usability applications from any device Reduced IT service desk calls Enhanced security while offering better usability! Easy control of privileged account access Increased productivity 4

  5. WHAT ARE RHAPSODY’S DIFFERENTIATING USABILITY FEATURES? Secure Sync across User Devices Secure Sharing between Users using public key cryptography using public key cryptography 5

  6. WHAT ARE RHAPSODY’S DIFFERENTIATING ENTERPRISE FEATURES? App remote Wipe Secure Credentials Recovery Lost/stolen/sold devices using QR codes & voice recognition 6

  7. WHAT ARE RHAPSODY’S DIFFERENTIATING SECURITY FEATURES? End-to-End Encryption & Privacy No man-in-the-middle, no back doors Secure Offline Access On-Device Secure Storage Local verification and split key technology Split Key and Public-key Cryptograph 7

  8. WHAT ARE RHAPSODY’S DIFFERENTIATING UBA FEATURES? User access patterns Device identification Device integrity Location Beacons nearby Risk-based & Policy-driven Access 8

  9. THANK YOU! 9

Recommend


More recommend