Senior Consultant - Principal SOC Security at Royal Technology Solutions LLC
Consultant
Top 10
2023-05-11T12:57:33Z
May 11, 2023
Currently, we do not have any additional sensitive servers, but we were recently tasked with implementing two-factor authentication for all of our servers. To accomplish this, we evaluated multiple vendors and found that RSA SecurID Access was the most compatible solution. Furthermore, RSA SecurID Access is well-established in the industry, making it the preferred choice for our needs.
The use case depends on the requirements of the customer. If they have on-premise and cloud requirements, it's the best use case instead of using Microsoft, which only supports cloud applications. Our company also offers Microsoft Authenticator and Office 360. We can compete with Microsoft in terms of cloud-only use cases or when the company has requirements beyond just user needs.
Authentication is the most fundamental component of access management and is part of security requirements in the digital world. It verifies the identity of users trying to access systems and data by validating their credentials.
We use it to make logins more secure by using multifactor authentication, making it easier to access various digital resources with a single sign-on.
I have telecom customers in Indonesia primarily using this solution. They use RSA SecurID Access for adaptive authentication capabilities.
Currently, we do not have any additional sensitive servers, but we were recently tasked with implementing two-factor authentication for all of our servers. To accomplish this, we evaluated multiple vendors and found that RSA SecurID Access was the most compatible solution. Furthermore, RSA SecurID Access is well-established in the industry, making it the preferred choice for our needs.
The use case depends on the requirements of the customer. If they have on-premise and cloud requirements, it's the best use case instead of using Microsoft, which only supports cloud applications. Our company also offers Microsoft Authenticator and Office 360. We can compete with Microsoft in terms of cloud-only use cases or when the company has requirements beyond just user needs.
We mainly use this solution for multifactor authentication.