RSA unveils advancements to the RSA Data Security System

RSA announced new capabilities in their Data Security System’s encryption and key management suite which are designed to secure sensitive data in file systems.

RSA File Security Manager 2.2 is designed to offer transparent encryption and role based access control for sensitive files and folders on Windows and Linux servers. By providing an extra layer of access control above and beyond what is offered via the operating system, the RSA File Security Manager solution is engineered to enable a “separation of duties” between security and systems administration, as well as restricting full access to files to only authorized users. This ensures that only authorized members of a role will have access to the actual content in the files and folders RSA File Security Manager 2.2 also offers complete transparency to users and applications, meaning that authorized users see no change when they access files and folders, and file server administrators can continue to manage these systems without any changes.

Key enhancements include:

  • Integration with RSA Key Manager technology: This integration offers enterprise key management for multiple encryption solutions at the application, file, and storage layers.
  • New platform support: RSA File Security Manager now supports 64-bit Windows and 32 bit Red Hat Linux platforms.
  • FIPS 140-2 validated cryptography: RSA File Security Manager uses FIPS certified, strong encryption technology to encrypt files and folders in place on file systems. Encryption can be implemented for select files and folders to help optimize organizations’ preferred granularity levels for security.
  • RSA SecurID integration: Offers increased security with strong authentication of security officers — helping to meet regulatory requirements for strong two-factor authentication based access control.
  • Audit only mode: RSA File Security Manager can be deployed in audit only mode to determine who is accessing sensitive content prior to turning on encryption and role-based access controls.



Share this