- Google I/O 2013's Coolest Products and Services
- 10 Star Trek Technologies That are Almost Here
- 19 Generations of Computer Programmers
- 25 Must-Have Technologies for SMBs
Network World - Beyond addressing details about its big breach of 2011, RSA Security executives this week outlined its 2012 product strategy that is centered on three areas, mobility, anti-threat and cloud security.
To help businesses better protect data on personal mobile devices, the company is shooting for tools to separate personal data and corporate data and to improve authentication to content accessed through those devices.
RSA CHIEF: Last year's breach has a silver lining
The roadmap calls for increasing the number of factors in multi-factor authentication by adding factors such as geolocation, biometrics and patterns of behavior, and applying them based on individual circumstances.
This scheme calls for embedding SecurID technology in mobile phones since they are device users carry with them all the time. The company says partnerships with chip makers will protect secrets such as passwords and encryption keys at a hardware level so if devices are compromised they won't yield them up to attackers.
Anti-threat efforts will give businesses visibility into what devices are being used for as well as avenues for sharing threat intelligence with other businesses, governments and information-sharing organizations such as Information Sharing and Analysis Centers (ISAC).
This plan will require analytic software that can mine enormous amounts of data for actionable intelligence. The company promises an announcement in this area at the RSA 2012 conference next month.
RSA's cloud efforts include Pegasus, a project dedicated to moving the functionality of RSA's current products to cloud environments where they could be sold as services.
The company also is working toward incorporating security in the gear used to build service-provider infrastructure to ensure that cloud services can meet security standards set by businesses as well as governments. This includes the federal push for agencies to hire certified cloud providers rather than build their own infrastructure.
Read more about security in Network World's Security section.