Global Sales Contact List

Contact   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

ABOUT RSA

Overview

RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world’s leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats. RSA delivers agile controls for identity assurance, fraud detection, and data protection; robust Security Analytics and industry-leading GRC capabilities; and expert consulting and advisory services.

Locations/Contact

RSA World Headquarters
174 Middlesex Turnpike
Bedford, MA 01730 USA
+1 781-515-5000

RSA EMEA Headquarters
RSA House, Western Rd,
Bracknell, Berkshire
RG12 1RT
01344 781000

RSA APAC Headquarters
1 Changi Business Park Central 1
#08-101
One@Changi City, Singapore
486036
+65 6692 3000

Download contact information for RSA Sales, Support, and Training worldwide.

Social Media

Connect with RSA on LinkedIn, Facebook, YouTube, and Twitter and visit our blog, Speaking of Security.

Communities

The RSA Xchange provides a portal to RSA communities, which include interest groups for RSA Archer, RSA Data Loss Prevention, RSA Security Analytics, and more.

Management

Arthur W. Coviello Jr.

Arthur W. Coviello Jr.

Executive Vice President, EMC Corporation; Executive Chairman, RSA

Art Coviello is responsible for RSA’s strategy and overall operations as it delivers EMC’s global vision of information-centric security.

Mr. Coviello was Chief Executive Officer of RSA Security, Inc. prior to its acquisition by EMC in 2006. He joined the company in 1995 and has been a driving force in its rapid growth since that time. Mr. Coviello’s expertise and influence have made him a recognized leader in the industry, where he plays a key role in several national cyber-security initiatives.

Mr. Coviello has spoken at numerous conferences and forums around the world. Mr. Coviello has more than 30 years of strategic, operating and financial management experience in high-technology companies. In addition, he currently serves on the Board of Directors at EnerNOC, a leader in demand response systems for energy conservation, and AtHoc, a leading provider of enterprise-class network-based mass notification systems for the security, life safety and defense sectors.

Mr. Coviello graduated magna cum laude from the University of Massachusetts.

Mark Quigley

Mark Quigley

Senior Vice President and Chief Operating Officer

Mark Quigley is Senior Vice President and Chief Operating Officer of RSA, The Security Division of EMC.

As COO, Quigley is responsible for operational execution across the entire business unit and leads its Services, IT, Public Sector, Manufacturing and Legal teams, as well as M&A. In 2013, Quigley rejoined RSA, where he previously oversaw corporate development, operations, information technology, product security, customer services and integration with EMC following EMC’s acquisition of RSA in 2006.

Prior to returning to RSA in 2013, Quigley served as Chief of Staff for EMC’s President and COO, David Goulden, where he helped to align and coordinate execution across EMC’s business units and functional organizations. Prior to that, he led Integration Management, responsible for working with senior leaders across the company to ensure that EMC’s acquisitions, new ventures and joint ventures are well structured, well executed and well integrated. At the same time, he also led Human Resources for EMC’s Information Infrastructure Products group, where he oversaw leadership development, acquisition integration and operational responsibilities for the division then-led by EMC President and Chief Operating Officer Pat Gelsinger.

Prior to that, Quigley served as EMC’s Chief Information Officer, responsible for leading EMC’s global Information Technology operations which encompassed Applications Development, Global Technology, Global Client Services, Portfolio Management, and Information Security. By ensuring a close partnership with EMC’s externally-facing organizations, the IT organization under Quigley’s leadership delivered quality technology solutions and services that facilitated the ability of customers and partners to do business with the company. Under his direction, EMC IT effectively integrated more than two dozen mergers and acquisitions into core EMC infrastructure and business processes, allowing EMC to realize rapid strategic gain associated with the acquisitions.

Before that, Quigley oversaw Global Customer Business Operations. He started his career at EMC in 1994 as a Sales and Marketing Controller and his responsibilities expanded over the years to North American Sales Operations, Global Sales Operations, and Global Business Operations for Sales and Service. Before joining EMC, Quigley served as Controller for Digital Equipment Corporation in several departments, including its software distribution business, U.S. manufacturing operations, and the PC business group.

Quigley holds a B.S. in finance from Babson College.

Amit Yoran

Amit Yoran

Senior Vice President, Unified Products, RSA

Amit Yoran serves as Senior Vice President of Products at RSA, where he provides leadership for RSA’s product-development and product-management organizations. In 2006, Mr. Yoran founded NetWitness Corporation, a provider of network security analytic products. He served as CEO until NetWitness was acquired by RSA in 2011. Prior to NetWitness, Mr. Yoran served as Corporate Director and Investor in numerous Information Security companies. In 2003 and 2004, he served as the Director of the National Cyber Security Division and US-CERT at the Department of Homeland Security. Formerly, he served as the Vice President of Worldwide Managed Security Services at the Symantec Corporation. Mr. Yoran was the
co-founder of Riptech, a market leading IT security company, and served as its CEO until the company was acquired by Symantec in 2002. He was an officer in the United States Air Force and was a founding member of the Department of Defense's Computer Emergency Response Team.

STRATEGY: INTELLIGENCE DRIVEN SECURITY

The Challenges

Today, information security is threatened as never before due to a convergence of business and technology developments that’s created a “perfect storm” for your adversaries.

  1. Organizations are now running mission-critical applications and core business functions in public clouds, which may or may not offer adequate data protection.
  2. BYOD has exploded, requiring IT to protect information that resides on devices the company doesn’t own, manage, or control.
  3. With the advent of “Big Data,” the sheer amount of information that must be managed and secured has exploded as well.
  4. Organizations are granting systems access not only to employees but to third parties such as contractors, vendors, and partners.

Meanwhile, your opponents have also matured, enabling them to take advantage of this expanded attack surface with zero-day malware, advanced persistent threats, and other forms of malicious infiltration. Today, it’s not a question of whether you will be breached – but when. And the stakes are high. One devastating attack can wipe out years of steady revenue, cutting-edge research, or a trusted brand.

The legacy security model, which defends a static perimeter and static infrastructure, has become ineffective for maintaining trust in our IT systems and digital businesses. What’s needed is an accelerated ability to detect and resolve intrusions that minimizes attacker free time in the network.

The Solution

An Intelligence Driven Security strategy helps organizations mitigate the risk of operating in a digital world by enabling them to detect, investigate, and respond to advanced threats; confirm and manage identities; and prevent online fraud and cybercrime.

To prevent inevitable breaches from causing damage or loss, Intelligence Driven Security delivers three essential capabilities: visibility, analysis, and action.

VISIBILITY
To design optimal defense strategies and prioritize activities, organizations need more visibility into risk. This includes network and endpoint visibility, which must go from today’s limited emphasis on logs and events down to the packet and session level in order to spot faint signals that indicate advanced threats. Digital identities are also key; organizations need to understand who and what are on their networks, what they are doing, and whether that behavior is appropriate. Finally, enterprises need transaction visibility: an understanding of what’s happening inside key applications.

ANALYSIS
Analysis involves understanding normal state behavior and then looking for anomalies. By knowing what is “normal,” an organization can spot, investigate, and root out abnormalities that result from malicious activity. Once an anomaly is discovered, contextual analysis determines the appropriate response.

ACTION
Action is the response to confirmed malicious anomalies. Rapid action allows organizations to mitigate potential threats by enforcing such controls as access restrictions or additional authentication. Action also includes remediation processes and activity. The key to success is consistency, so that each time an analysis finds something potentially threatening the organization can “operationalize” the response.

The Benefits

Along with the crucial ability to combat today’s increasingly dangerous threat landscape, Intelligence Driven Security provides additional benefits.

Focus: Intelligence Driven Security drives action based on mitigating the most pressing risks, ensuring that organizations prioritize activities and resources optimally.

Efficiency: Intelligence Driven Security reduces the number of point products and fuses otherwise disjointed data sets and tools, increasing both security and operational efficiency.

Savings: Because it identifies attacks more rapidly, Intelligence Driven Security reduces bottom-line losses that often result from an undetected breach.

Competitiveness: An organization that effectively manages its digital risks can confidently channel resources into growing, expanding, and differentiating the business through value-added initiatives.

Staffing: Intelligence Driven Security empowers top performers with cutting-edge technologies that extend their efforts throughout the organization. Automation can free overburdened employees to add more value, and elevate average performers into vital contributors.

It’s Your Move

Regardless of your current technologies or strategies, your organization can move towards Intelligence Driven Security. Current investments can be used as the building blocks of a more sophisticated model. A roadmap across people, process, and technology can increase security maturity. What’s important is not where you are today, but the steps you take to improve.

Solutions

RSA Solutions for Intelligence-Driven Security

RSA provides products and solutions in four key areas to help organizations adopt intelligence-driven security:

ANTI-FRAUD: Fighting online fraud and cybercrime by diminishing or eliminating losses through the prevention of unauthorized use and/or acquisition of critical information such as credentials and identities.

IDENTITY: Reducing risks to business operations related to digital data and systems by securing interactions between people and information. Protecting the organization’s processes, ensuring confidentiality, integrity, and availability related to information, identities, and infrastructure.

GOVERNANCE, RISK, AND COMPLIANCE: Ensuring the organization is compliant in a cost-effective and efficient way that is aligned with both risk and business objectives.

SECURITY OPERATIONS: Preparing for, identifying, coordinating, and responding to threats, including Advanced Persistent Threats (APT).

Services

Worldwide Service and Support

RSA provides customers with timely responses to their requests and inquiries with 24x7 support from offices worldwide. Additionally, our RSA SecurCare online portal offers anytime, anywhere access to thousands of documents containing the latest critical support information to help organizations optimize their investment in RSA technology.

Professional Services

RSA Professional Services helps organizations successfully implement high-value security solutions based on RSA technology. Leveraging the expertise of its organization, RSA brings together the technology, services, and know-how necessary to develop and implement a comprehensive information-security strategy.

Security Consulting

The RSA Security Practice of EMC Consulting approaches security from a business context that prioritizes security investments. Services from the Practice specialize in both security policy and compliance areas such as PCI DSS and HIPAA/HITECH and span areas such as data classification, information risk management, GRC and policy management, fraud mitigation, identity assurance, virtualization, and security operations.

Training and Certification

As organizations implement new technologies, add new functionality to existing systems, or orient new staff, education is a crucial element. RSA provides consistent training that helps to maintain the security of a computing environment, improve the end-user experience, and increase productivity and job satisfaction.

Research

RSA has two centers – RSA Laboratories and the RSA Anti-Fraud Command Center – dedicated to advancing security research and intelligence and staying up-to-date on the latest global threats.

Established in 1991, RSA Laboratories is the research center of RSA and the security research group within the EMC Innovation Network. Through its applied research program and academic connections, RSA Laboratories provides state-of-the-art expertise in cryptography and data security for the benefit of RSA, EMC, and their customers.

The RSA Anti-Fraud Command Center (AFCC) addresses online fraud threats such as phishing, pharming, and Trojan attacks on behalf of RSA customers. The AFCC is staffed with more than 130 analysts and operates 24x365. The group has relationships with over 13,000 web-hosting service partners and some of the world’s leading browser developers, ISPs, e-mail providers, and anti-virus, anti-spam, and firewall firms including Microsoft, AOL, Netscape, EarthLink, Google, Mozilla, and Safari. RSA FraudAction Research Labs works alongside AFCC fraud analysts to build tools and processes that enable analysts to handle the newest threats.

Notes:
Connect with EMCConnect with EMC
Need help immediately? EMC Sales Specialists are standing by to answer your questions real time.
Use Live Chat for fast, direct access to EMC Customer Service Professionals to resolve your support questions.
Explore and compare EMC products in the EMC Store, and get a price quote from EMC or an EMC partner.
We're here to help. Send us your sales inquiry and an EMC Sales Specialist will get back to you within one business day.
Want to talk? Call us to speak with an EMC Sales Specialist live.