Overview

RSA Provides Mission Critical Cybersecurity Capabilities Across the Federal Government

RSA, the Security Division of EMC, is the premiere provider of intelligence-driven security solutions to the Federal government, serving every cabinet level agency, each military service, and the intelligence community. Every day, RSA serves the mission of government, helping solve the most complex and sensitive security challenges:

  • Defending against advanced threats
  • Managing organizational risk
  • Safeguarding access and collaboration
  • Preventing web-based fraud

RSA delivers agile controls for identity assurance, fraud detection, and data protection; robust Security Analytics and industry-leading governance, risk and compliance (GRC) capabilities; and expert consulting and advisory services, including time-critical breach response services.

  • An Intelligence-Driven Approach

    RSA’s Intelligence Driven Security capabilities help organizations mitigate the risk of operating in a digital world by enabling them to detect, investigate, and respond to advanced threats; confirm and manage identities; and prevent web-based fraud and cybercrime.

    The benefits are significant. An Intelligence-Driven approach is risk-driven, incremental, achievable, future proof, and agile.

  • RSA Solutions for Government From Carahsoft: Advanced Security Options

    Security Operations Centers (SOCs) need collaborative, cross-disciplinary teams with highly specialized skill sets to combat advanced cyber threats. RSA provides professional services and products to help you build a best-in-class SOC:

    • RSA’s Advanced Cyber Defense Practice provides a range of solutions to help agencies protect their mission, drive operational efficiencies, and evolve with a dynamic threat environment. RSA’s Enterprise Compromise Assessment Tool (ECAT) is an enterprise threat-detection and response solution designed to monitor and protect IT environments from undesirable software and the most elusive malware. 
    • RSA’s Security Analytics suite is designed to provide security organizations with the situational awareness needed to deal with their most pressing security issues.
  • Governnance, Risk & Compliance

    RSA’s Archer GRC suite provides you with clear visibility into all of the risks that your organization needs to manage, giving you confidence that your compliance posture and your security posture are optimally managed. RSA Archer provides a capability that helps you manage risk and compliance use-cases across the business. Get a holistic view across the organization in rolled-up, actionable reporting that brings all of this information together for executive leaders.

  • Intelligence-Driven Continuous Monitoring

    The RSA Archer Continuous Monitoring (CM) solution is purpose built to meet the needs of federal agencies by providing mission critical capabilities essential to every Information Assurance (IA) Continuous Monitoring program. Archer offers next-generation CM/CMaaS features today:

    • Near real time visibility into the security posture of every device in the enterprise 
    • Manage with risk-based approach by prioritizing security risk data and focusing on “worst first” 
    • Maintain a common operational cyber landscape with aggregation and correlation of data and stay current with latest requirements 
    • Real time alerting capabilities, advanced reporting, and dashboards at multiple levels of the organization 
    • Protect infrastructure across network endpoint such as laptops, desktop computers, and servers 
    • Protect sensitive information while continually providing essential services. 
    • Track and report compliance across vulnerabilities, configurations, assets, and applications 
    • Leverage, maximize, and utilize existing and new agency infrastructure CDM tools
  • Identity & Access Management

    The critically sensitive data, systems, devices, and facilities that the Federal government necessarily utilizes combine to create an environment uniquely susceptible to unauthorized access. RSA’s Identity solutions help provide the market leading capabilities you need to:

    • Build trust in your identity ecosystem. 
    • Know your users and how they interact with your systems. 
    • Leverage identity intelligence across your security program. 
    • Provide ease and flexibility for the end user.
  • Fraud & Risk Intelligence

    Despite the security measures taken by most organizations, fraud and misuse continue to increase at alarming rates. RSA’s Fraud and Risk Intelligence Suite offers a complete portfolio of strong authentication and anti-fraud technologies designed to help organizations:

    • Manage the overall risk of remote channel activities and transactions. 
    • Inspire user confidence through enhanced protection. 
    • Mitigate the risk of cybercrime, fraud, misuse and identity theft.

Products

RSA Business Driven Security

RSA’s business-driven security solutions help customers comprehensively and rapidly link security incidents with business context to respond effectively and protect what matters most. With award-winning solutions for rapid detection and response, identity and access assurance, consumer fraud protection, and business risk management, RSA customers can thrive in an uncertain, high-risk world. It’s time for Business-Driven Security.


RSA NetWitness® Suite
Triple the impact of your existing security team


RSA SecurID® Suite
Accelerate business while mitigating identity risks


RSA® Fraud and Risk Intelligence Suite
Act at the speed of fraud


RSA Archer® Suite
Know which Risk is Worth Taking


RSA SecurID® Access Test Drive
Start your Free Trial Today!


Contact Carahsoft Technology Corp about RSA Solutions | 703-230-7419

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2018 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

State of Indiana Contract

Contract Number: 0000000000000000000021430 Term: August 1, 2017 – July 31, 2019

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

Texas DIR-TSO-3926

Expiration Term: June 29, 2018 (with 3 option years)

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021

VITA Contract

Term: through March 31, 2019


Events

Archived Events

News

Latest News

Carahsoft Technology Corp., The Trusted Government IT Solutions Provider™, today announced that it is expanding its distribution agreement with RSA, a global cybersecurity leader delivering ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, today announced that products and services from RSA, the Security Division of EMC, are now available from Carahsoft. Carahsoft ...
READ MORE >

Resources

Featured

RSA®, a global cybersecurity leader delivering Business-Driven Security™ solutions, unveiled a new risk-based access review user experience, implementation service offerings and recommended practices for RSA Identity Governance and Lifecycle that simplify day-to-day governance while helping to re...

Datasheet

IAM programs are struggling to keep up with new challenges presented by cloud, mobile, and today’s advanced attack campaigns. The proliferation of multiple disparate Identity solutions is expanding the attack surface exponentially, making it very difficult to secure access and maintain complian...

When was the last time you were surprised by the unexpected? Most of us go through our data search routines looking for supporting details to strengthen our existing assumptions. What if we looked at the same data but from a slightly different perspective? Let’s walk through a simple yet very ...

RSA Web Threat Detection can help government agencies meet the challenges posed by the ever evolving threat landscape through the use of behavioral analysis to distinguish legitimate from disruptive users. Information Security, Network Security, Information Assurance, Cybercrime organizations and...

Perimeter defenses are inadequate protection against today's advanced threats. Traditional signature-based approaches leave a gap as attackers continuously use new, hard-to-detect methods to compromise hosts, establish a hidden presence on target systems, and exfiltrate sensitive data out of organiz...

With today's rapidly evolving threat environment, one of the keys to securing your organization is to see and understand everything that is happening on your network. Real-time visibility and high powered analytics along with long term data retention is required to fulfill detection, investigation, ...

Advanced Persistent Threats (APTs) are the one constant and enterprises are centralizing incident-response teams to detect and respond to them. The Security Operations Center (SOC) is the centralized incident-response team reporting through the CSO/CISO and consisting of people, process, and technol...

Today’s evolving threat landscape makes it difficult for organizations to adequately detect and respond to online threats. New and increasingly sophisticated attacks from DDoS to malware to Man in the Middle to account takeover are constantly being developed and deployed, making it extremely di...

Security is a constantly evolving challenge for organizations that are managing shrinking IT budgets while, at the same time, needing to expand security to a larger population of users. This is compounded by users accessing sensitive data using unmanaged mobile devices via uncontrolled access points...

Ransomware is a form of malware that targets both human and technical weaknesses in organizations in an effort to deny the availability of critical data and/or systems. When the victim organization determines they are no longer able to access their data, the cyber actor demands the payment of a ra...