Synergistic acquisition will complement existing RSA business and open new doors With the 4th now behind us, EMC announced its acquisition of Aveksa, an Identity and Access Management (IAM) vendor focused on identity governance. As acquisitions go, this one was on the small side so much of the security world will likely miss it as they continue thinking about fireworks, swimming, hotdogs, and hamburgers from this past weekend. All good memories, but I believe this acquisition is worth paying attention to for several reasons:1. The IAM space is in a state of transition. The IAM big 3, CA, IBM, and Oracle, established their leadership position when IAM was focused inside the enterprise on things like work flows, provisioning, and single sign-on. Yes, we still need that stuff but today’s reality of mobility, cloud, and open networks demands a completely new model. CA, IBM, and Oracle will certainly compete but history demonstrates that market transitions create new opportunities. With the acquisition of Aveksa, RSA is jumping into the evolving identity pool in a big way. 2. Aveksa focuses on the business side of IAM. While IT tends to IAM plumbing and maintenance, business managers define policies, oversee access rights, and are accountable for violations. Aveksa plays in this business-centric space while plugging into IAM and security infrastructure. Why is this important? RSA is transitioning its products into a new type of enterprise-class security architecture. Security efficacy is important here but enterprise security infrastructure will also have to play at the boardroom level with the potential to lower risk, automate processes, streamline operations, and support business initiatives. RSA/Aveksa are well aligned here.3. RSA can now supplement security analytics with policy enforcement. RSA has developed a strong security analytics portfolio for risk management as well as incident detection/response. What’s missing is the other side of the equation, policy enforcement and fine-tuning of security controls once analytics detect a problem. Aveksa can help RSA add this capability over time, enforcing policies at the weakest link of the security chain – people. For example, when analytics indicate that an intelligence analyst is downloading massive amounts of classified documents, RSA will detect this anomaly and then enforce an immediate role change to preclude further damage.Of course RSA gets immediate upside by aligning Aveksa with its existing authentication business – both traditional tokens and the burgeoning business for enterprise risk-based authentication. There will also be growing cloud opportunities in this space as well.RSA’s biggest challenges include creating the right model and messages to weave its growing array of products into an integrated enterprise architecture and developing a consumption model for CISOs that starts with one product and adds value as new piece parts are glued together. That said, RSA is not alone here, Cisco, HP, IBM, McAfee, and Symantec have the same wall to climb. In the meantime, RSA can now fight the enterprise security architecture fight on yet another front, IAM, now that it has Aveksa in hand. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe