Overview

RSA Provides Mission Critical Cybersecurity Capabilities Across the Federal Government

RSA, the Security Division of EMC, is the premiere provider of intelligence-driven security solutions to the Federal government, serving every cabinet level agency, each military service, and the intelligence community. Every day, RSA serves the mission of government, helping solve the most complex and sensitive security challenges:

  • Defending against advanced threats 
  • Managing organizational risk 
  • Safeguarding access and collaboration 
  • Preventing web-based fraud 

RSA delivers agile controls for identity assurance, fraud detection, and data protection; robust Security Analytics and industry-leading governance, risk and compliance (GRC) capabilities; and expert consulting and advisory services, including time-critical breach response services.

  • An Intelligence-Driven Approach

    RSA’s Intelligence Driven Security capabilities help organizations mitigate the risk of operating in a digital world by enabling them to detect, investigate, and respond to advanced threats; confirm and manage identities; and prevent web-based fraud and cybercrime.

    The benefits are significant. An Intelligence-Driven approach is risk-driven, incremental, achievable, future proof, and agile.

  • RSA Solutions for Government From Carahsoft: Advanced Security Options

    Security Operations Centers (SOCs) need collaborative, cross-disciplinary teams with highly specialized skill sets to combat advanced cyber threats. RSA provides professional services and products to help you build a best-in-class SOC:

    • RSA’s Advanced Cyber Defense Practice provides a range of solutions to help agencies protect their mission, drive operational efficiencies, and evolve with a dynamic threat environment. RSA’s Enterprise Compromise Assessment Tool (ECAT) is an enterprise threat-detection and response solution designed to monitor and protect IT environments from undesirable software and the most elusive malware. 
    • RSA’s Security Analytics suite is designed to provide security organizations with the situational awareness needed to deal with their most pressing security issues.
  • Governnance, Risk & Compliance

    RSA’s Archer GRC suite provides you with clear visibility into all of the risks that your organization needs to manage, giving you confidence that your compliance posture and your security posture are optimally managed. RSA Archer provides a capability that helps you manage risk and compliance use-cases across the business. Get a holistic view across the organization in rolled-up, actionable reporting that brings all of this information together for executive leaders.

  • Intelligence-Driven Continuous Monitoring

    The RSA Archer Continuous Monitoring (CM) solution is purpose built to meet the needs of federal agencies by providing mission critical capabilities essential to every Information Assurance (IA) Continuous Monitoring program. Archer offers next-generation CM/CMaaS features today:

    • Near real time visibility into the security posture of every device in the enterprise 
    • Manage with risk-based approach by prioritizing security risk data and focusing on “worst first” 
    • Maintain a common operational cyber landscape with aggregation and correlation of data and stay current with latest requirements 
    • Real time alerting capabilities, advanced reporting, and dashboards at multiple levels of the organization 
    • Protect infrastructure across network endpoint such as laptops, desktop computers, and servers 
    • Protect sensitive information while continually providing essential services. 
    • Track and report compliance across vulnerabilities, configurations, assets, and applications 
    • Leverage, maximize, and utilize existing and new agency infrastructure CDM tools
  • Identity & Access Management

    The critically sensitive data, systems, devices, and facilities that the Federal government necessarily utilizes combine to create an environment uniquely susceptible to unauthorized access. RSA’s Identity solutions help provide the market leading capabilities you need to:

    • Build trust in your identity ecosystem. 
    • Know your users and how they interact with your systems. 
    • Leverage identity intelligence across your security program. 
    • Provide ease and flexibility for the end user.
  • Fraud & Risk Intelligence

    Despite the security measures taken by most organizations, fraud and misuse continue to increase at alarming rates. RSA’s Fraud and Risk Intelligence Suite offers a complete portfolio of strong authentication and anti-fraud technologies designed to help organizations:

    • Manage the overall risk of remote channel activities and transactions. 
    • Inspire user confidence through enhanced protection. 
    • Mitigate the risk of cybercrime, fraud, misuse and identity theft.

Products

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- June 17, 2017


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: June 17, 2017

CMAS

Contract # CMAS 3-12-70-2247E Term: through September 30, 2017

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

National Intergovernmental Purchasing Alliance (National IPA)

Term: through May 31, 2018 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: June 17, 2017

VASCUPP

Contract Number: UVA1482501 Contract Term: May 2, 2014– June 17, 2017

VITA Contract

Term: through March 31, 2018


Events

Upcoming Events

June 08, 2017 at 11:00 AM EDT

Archived Events

News

Latest News

Carahsoft Technology Corp., the trusted government IT solutions provider, today announced that products and services from RSA, the Security Division of EMC, are now available from Carahsoft. Carahsoft ...
READ MORE >

Resources

I didn't know it at the time but my introduction to the security specialty of incident response occurred when I first read the book The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, by Clifford Stoll. The book goes into great detail of how Stoll combined his general curio...

Perimeter defenses are inadequate protection against today's advanced threats. Traditional signature-based approaches leave a gap as attackers continuously use new, hard-to-detect methods to compromise hosts, establish a hidden presence on target systems, and exfiltrate sensitive data out of organiz...

Today’s evolving threat landscape makes it difficult for government agencies to adequately detect and respond to increasingly sophisticated attacks. Perhaps the single most challenging threat facing the United States government is the insider threat. Though they occur with less frequency than t...

Achieving the right balance of security – without compromising the user experience – is a challenge for many federal agencies. RSA® Adaptive Authentication solves this challenge by providing risk-based multi-factor authentication for government agencies, ensuring the integrity of every user log...

This presentation is for informational purposes only. This document contains certain statements that may be deemed “forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995.

It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increa...

RSA Identity Governance simplifies how user access is governed across the enterprise, making it possible to achieve sustainable compliance by fully automating the monitoring, reporting, certification and remediation of user entitlements.

Industry expert Matt McCormack, former CISO at IRS and the Defense Intelligence Agency and now Chief Technology Officer of RSA’s Global Public Sector gives Director of Custom Media Jason Fornicola an overview of how organizations can rapidly respond to a data breach.

When organizations have confidence their information is secure, they are empowered to use it to accelerate their business. Identity assurance creates confidence and extends user authentication from a single security measure to a continual trust model that is the basis of how an identity is used and ...

Achieving the right balance of security – without compromising the user experience – is a challenge for many federal agencies. RSA® Adaptive Authentication solves this challenge by providing risk-based multi-factor authentication for government agencies, ensuring the integrity of every user log...