DATA SHEET
RSA Mobile Lock
            ®
Secure authentication on managed and unmanaged devices
                              Trust the authentication process
Benefits                      RSA Mobile Lock identifies security threats on mobile devices and can restrict new
                              authentication requests, thereby securing access to protected resources. This
• Establish trust in          capability enables organizations to establish trust by systematically validating mobile
  unmanaged                   authentication throughout their IT estate while actively identifying threats.
  mobile devices
• Seamlessly integrated       Respond to threats
  within RSA                  When a user attempts to authenticate, RSA Mobile Lock searches for threats on their
  Authenticator for           mobile device; if a threat is detected, the authentication process is restricted and access
  iOS and Android             to secure environments, including company data, enterprise systems, and customer
• Restrict authentication     records, is prevented. This proactive measure effectively contains threats, preventing
  to protect resources        them from spreading beyond a single compromised device and averting widespread
                              consequences for an organization. Using the Mobile Lock console, organizations can
• Users can continue          easily customize and prioritize the list of threats they wish to detect and define the
  using other device apps     appropriate responses.
  and features when
  “Mobile Locked”
• Prevent threats
  from spreading
  during investigations
• Customize configuration
  based on priorities
• No additional software
  or installation required,
  such as Mobile Device
  Management (MDM)
  or Mobile Threat
  Detection (MTD)
                                      Admin view of Mobile Lock console             User view of
                                                                                  threat detected
                                                                                  on mobile phone
Minimize the impact on users
Given the prevalence of Bring Your Own Device (BYOD) policies today, it’s essential to consider how
requirements to enforce corporate security on personal devices can potentially disrupt the user experience.
RSA Mobile Lock minimizes this risk by seamlessly integrating into RSA Authenticator for iOS and Android,
eliminating the need for a separate installation. Additionally, if Mobile Lock detects a threat, the solution only
suspends the user’s ability to use RSA Authenticator, and maintains their ability to make calls, text, browse
the internet, and use other device features.
RSA Mobile Lock: the workflow
RSA Mobile Lock protects the authentication process and stops mobile devices with security concerns from
accessing valuable corporate assets. While not visible to users, Mobile Lock scans the device every time an
authentication is attempted.
                                                                                               When “Mobile Locked,” the only impact to
                                                                                               the mobile device is that authentication is
                 When the authentication                                                       no longer possible. Users can continue using
                 process begins, Mobile Lock                                                   other device apps and features, such as
                 can check for more than 40                                                    phone calls, SMS, and their web browser.
                 potential security threats.
                                                                          Authentication                                 User is prompted to
                                                                           workflow is                                  contact IT Help Desk
                                                                         “Mobile Locked”                                   to resolve issue
                              Has Mobile                      s
User requests
                            Lock identified a               Ye
authentication
                            security threat?
                                                          N
                                                           o
                                                                                                                           IT Help Desk uses
                                                                             User can
                                                                                                                             Mobile Lock to
                                                                           authenticate
                                                                                                                           investigate threat
                                                                     User gains access to
                                                                                                                          Threat resolved
                                                                  business systems and data
About RSA
The AI-powered RSA Unified Identity Platform protects the world’s most secure organizations from today’s and
tomorrow’s highest-risk cyberattacks. RSA provides the identity intelligence, authentication, access, governance, and
lifecycle capabilities needed to prevent threats, secure access, and enable compliance. More than 9,000 security-first
organizations trust RSA to manage more than 60 million identities across on-premises, hybrid, and multi-cloud
environments. For more information, go to RSA.com.
                           ©2023 RSA Security LLC or its affiliates. All rights reserved. SecurID, RSA and the RSA logo are registered trademarks or trademarks of RSA
                           Security LLC or its affiliates in the United States and other countries. All other trademarks are the property of their respective owners. RSA
                           believes the information in this document is accurate. The information is subject to change without notice. 10/23 Data Sheet.