Tim Norris

Product Marketer, RSA

Tim is a principle product marketer championing identity and access assurance at RSA. Tim has over a decade of experience bringing products to market that solve complicated challenges for organizations in regulated industries from cyber security, payment card processing, financial accounting and education. Tim’s passion is to help organizations see through the technical clutter to understand the tangible value technology can bring to their organizations to solve real-world business needs and translate that value into real returns on their technology investment.

The Case for Multi-Factor Authentication Wherever Users Connect
BrandPost RSA SecurID® Suite

The Case for Multi-Factor Authentication Wherever Users Connect


Don’t Let Siloed Identity Governance Put Your Organization at Risk

Don’t Let Siloed Identity Governance Put Your Organization at Risk

“But that’s the way we’ve always done it” isn’t much of a defense for the old siloed approach to identity governance and administration that so many organizations continue to rely on. When organizations stop treating identity...

No More Excuses for Leaving Legacy and Custom Apps Unprotected

No More Excuses for Leaving Legacy and Custom Apps Unprotected

What happens when multi-factor authentication meets a next-generation firewall? It’s easier than ever to add another layer of security to custom and legacy apps that don’t support authentication protocols.

3 Musts for VPN Multi-Factor Authentication

3 Musts for VPN Multi-Factor Authentication

Remember the good old days, when the only people who needed access to your virtual private network (VPN) were full-time, on-site employees using company-issued devices? Today, the people who need VPN access are as likely to be...

MFA: Enhancing Digital Workspace Security Without Sacrificing Convenience

MFA: Enhancing Digital Workspace Security Without Sacrificing Convenience

As digital transformation leads more organizations to discover the value of digital workspaces for today’s work-anywhere workforce, the question of how to keep them secure inevitably comes up. After all, most digital workspaces...

Strengthen Cloud App Security with Multi-Factor Authentication

Strengthen Cloud App Security with Multi-Factor Authentication

Chances are your organization uses cloud applications like Microsoft Office 365, Salesforce and Workday every day. And chances are also that the cloud applications you count on are primarily password-protected. At a time when 81...

Identity Governance and Administration: Make It Easy on Yourself

Identity Governance and Administration: Make It Easy on Yourself

No matter what area of identity governance and administration you’re dealing with—managing identity lifecycles, handling access requests, trying to balance doing access certifications right and doing them fast—you’ve got your work...

Access Certification Reviews: There’s Got to be a Better Way

Access Certification Reviews: There’s Got to be a Better Way

What’s not to love about access certification reviews? Plenty. They take forever, take people away from their core responsibilities, and take a toll on everyone involved - from lines of business to the security team. Here’s a look...

When Employees Leave, Make Sure Your Data Doesn’t Go With Them

If you let someone into your home to repair your refrigerator, would you let them leave with the keys to the house? Of course not. If you got a divorce, would you let your ex take a set of keys and not change the locks? Generally,...

Optimizing Identity Risk Management Doesn’t Have to Be an Uphill Climb

Optimizing Identity Risk Management Doesn’t Have to Be an Uphill Climb

If you thought keeping your organization safe from identity risks was a challenge before, brace yourself: Changes in the identity landscape are making risk management tougher than ever. It’s crowded with more users and more types...

8 Critical Identity Risk Factors – And How to Manage Them

8 Critical Identity Risk Factors – And How to Manage Them

Applications and other business resources today are as likely to be in the cloud as on-premises, and users are eager to access them from anywhere there’s an Internet connection. That makes it easier to work productively, but...

Load More