0% found this document useful (0 votes)
42 views2 pages

RSA MobileLock Datasheet

Uploaded by

Khanh Cules
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views2 pages

RSA MobileLock Datasheet

Uploaded by

Khanh Cules
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DATA SHEET

RSA Mobile Lock


®

Secure authentication on managed and unmanaged devices

Trust the authentication process


Benefits RSA Mobile Lock identifies security threats on mobile devices and can restrict new
authentication requests, thereby securing access to protected resources. This
• Establish trust in capability enables organizations to establish trust by systematically validating mobile
unmanaged authentication throughout their IT estate while actively identifying threats.
mobile devices

• Seamlessly integrated Respond to threats


within RSA When a user attempts to authenticate, RSA Mobile Lock searches for threats on their
Authenticator for mobile device; if a threat is detected, the authentication process is restricted and access
iOS and Android to secure environments, including company data, enterprise systems, and customer
• Restrict authentication records, is prevented. This proactive measure effectively contains threats, preventing
to protect resources them from spreading beyond a single compromised device and averting widespread
consequences for an organization. Using the Mobile Lock console, organizations can
• Users can continue easily customize and prioritize the list of threats they wish to detect and define the
using other device apps appropriate responses.
and features when
“Mobile Locked”

• Prevent threats
from spreading
during investigations

• Customize configuration
based on priorities

• No additional software
or installation required,
such as Mobile Device
Management (MDM)
or Mobile Threat
Detection (MTD)

Admin view of Mobile Lock console User view of


threat detected
on mobile phone
Minimize the impact on users
Given the prevalence of Bring Your Own Device (BYOD) policies today, it’s essential to consider how
requirements to enforce corporate security on personal devices can potentially disrupt the user experience.
RSA Mobile Lock minimizes this risk by seamlessly integrating into RSA Authenticator for iOS and Android,
eliminating the need for a separate installation. Additionally, if Mobile Lock detects a threat, the solution only
suspends the user’s ability to use RSA Authenticator, and maintains their ability to make calls, text, browse
the internet, and use other device features.

RSA Mobile Lock: the workflow


RSA Mobile Lock protects the authentication process and stops mobile devices with security concerns from
accessing valuable corporate assets. While not visible to users, Mobile Lock scans the device every time an
authentication is attempted.

When “Mobile Locked,” the only impact to


the mobile device is that authentication is
When the authentication no longer possible. Users can continue using
process begins, Mobile Lock other device apps and features, such as
can check for more than 40 phone calls, SMS, and their web browser.
potential security threats.

Authentication User is prompted to


workflow is contact IT Help Desk
“Mobile Locked” to resolve issue
Has Mobile s
User requests
Lock identified a Ye
authentication
security threat?
N
o

IT Help Desk uses


User can
Mobile Lock to
authenticate
investigate threat

User gains access to


Threat resolved
business systems and data

About RSA
The AI-powered RSA Unified Identity Platform protects the world’s most secure organizations from today’s and
tomorrow’s highest-risk cyberattacks. RSA provides the identity intelligence, authentication, access, governance, and
lifecycle capabilities needed to prevent threats, secure access, and enable compliance. More than 9,000 security-first
organizations trust RSA to manage more than 60 million identities across on-premises, hybrid, and multi-cloud
environments. For more information, go to RSA.com.

©2023 RSA Security LLC or its affiliates. All rights reserved. SecurID, RSA and the RSA logo are registered trademarks or trademarks of RSA
Security LLC or its affiliates in the United States and other countries. All other trademarks are the property of their respective owners. RSA
believes the information in this document is accurate. The information is subject to change without notice. 10/23 Data Sheet.

You might also like