Jim Ducharme

Vice President, Identity Products at RSA

Jim Ducharme is currently the Vice President of Identity Products at RSA. Jim is responsible for product strategy for RSA’s Identity business, and leads the associated product management and engineering teams. He has over 15 years of leading product organizations in the Identity market space, including his previous executive leadership roles at Netegrity, CA, and Aveksa.

Improving access certification processes makes life easier for business users. But that’s not the point

Getting to know you: How continuous identity and access management transforms secure access

Getting to know you: How continuous identity and access management transforms secure access

Better access decisions come from authentication solutions that work constantly to get to know users and resources better and better over time.

Strength in knowledge: How connected identity and access management transforms secure access

Strength in knowledge: How connected identity and access management transforms secure access

Connecting systems and sharing intelligence are key to fighting cybercrime—because even the most robust identity and access management solution can’t do it alone.

Here, there, everywhere: How pervasive identity and access management transforms secure access

Here, there, everywhere: How pervasive identity and access management transforms secure access

When users are as likely to be working on the go as at their desks, and applications are as likely to be in the cloud as on-premises, you need identity and access management everywhere.

The path to modern authentication and cybersecurity is pervasive, connected and continuous

The path to modern authentication and cybersecurity is pervasive, connected and continuous

What makes secure access truly secure today? Authentication that works seamlessly – everywhere, all the time.

Transforming secure access to take on today’s cyber threats

Transforming secure access to take on today’s cyber threats

Last year, 81% of cyber attacks involved compromised passwords—up from 63% the previous year. How much worse can it get? Let’s not wait around to find out.

Security and Convenient Access: Finding the Balance with Facial Recognition

Security and Convenient Access: Finding the Balance with Facial Recognition

Security or convenience? That is the question—at least when it comes to user authentication and access to resources. But with recent advances in facial recognition, the question is no longer an either-or proposition. Rather than...

Blurred Boundaries and New Methods: What’s Trending in Authentication

Blurred Boundaries and New Methods: What’s Trending in Authentication

Remember when hardware tokens and complex passwords were the only ways to deliver secure access? Today, mobile and cloud applications are driving demand for convenient authentication methods to serve a large, diverse...

Load More