Fact-checked by Grok 2 weeks ago

RSA SecurID


is a technology originally developed by Security Dynamics Technologies and acquired by in 1996, utilizing hardware or software tokens that generate time-synchronized one-time passcodes every 60 seconds, which users combine with a to access protected network resources.
The system relies on a unique symmetric seed key embedded in each token, paired with a that produces pseudorandom tokencodes aligned with the authentication server's clock, enabling secure verification without transmitting static secrets over networks.
Widely adopted by enterprises, , and agencies for its robust against password-only attacks, SecurID faced a major challenge in 2011 when an compromised RSA's seed data, necessitating token replacements for affected customers and highlighting supply-chain risks in .

History

Origins and Development

The origins of RSA SecurID trace back to Security Dynamics Technologies, Inc., founded in 1984 by Kenneth P. Weiss, an entrepreneur and human factors engineer. Weiss invented the core SecurID technology, consisting of hardware tokens that generate time-synchronized one-time passwords for two-factor , addressing vulnerabilities in static passwords by leveraging a seed between the token and authentication server. Security Dynamics developed and commercialized SecurID tokens in the mid-to-late , focusing on enterprise amid rising concerns over unauthorized access. Weiss served as CEO until 1986, then as chairman and until 1996, during which the company patented key aspects of the system, including methods for dynamic password generation without transmitting the seed. By the early , SecurID had gained traction in financial and sectors for its hardware-based approach, which resisted replay attacks through short-lived codes typically valid for . In April 1996, Security Dynamics announced its acquisition of , a cryptography firm founded by , , and , for approximately $200 million, with the deal closing in July. This merger combined SecurID's authentication hardware with 's public-key encryption expertise, forming a unified security portfolio. The resulting entity, renamed in 1999, rebranded the product as RSA SecurID, expanding its development toward integrated software and server solutions while maintaining the foundational time-based algorithm.

Early Commercialization and Adoption

Security Dynamics Technologies Inc., founded in 1986, introduced the SecurID system that year as its flagship product for two-factor authentication, employing tokens that generated time-based one-time passwords. The core algorithm, developed by John Brainard in 1985, hashed a unique 64-bit seed per token with the current time to produce pseudorandom codes valid for short intervals, typically 60 seconds, requiring synchronization with a central via an ACE/Server appliance. This mechanism supplemented static passwords with a dynamic "something you have" factor, targeting vulnerabilities in early network remote access like dial-up modems, where single-factor authentication proved inadequate against or guessing attacks. Commercialization emphasized tokens resembling key fobs or calculators, priced for enterprise deployment, alongside software for management and validation. Security Dynamics marketed SecurID primarily to sectors handling high-value data, such as banking and , where unauthorized access could yield severe financial or operational damage. By 1995, the product line, including variants, contributed to $34 million in annual revenue, reflecting growing demand for scalable authentication beyond physical . Early adoption accelerated in the late 1980s and early 1990s among companies and government entities, including the U.S. Department of Defense, which integrated tokens for securing classified networks and remote logins. Financial firms, facing rising threats from electronic fraud, deployed SecurID to authenticate VPN precursors and systems, establishing it as a before widespread commerce. Partnerships, such as the 1996 licensing deal with to embed SecurID support in , further propelled integration into enterprise operating systems, signaling broad commercial viability by the mid-1990s.

Corporate Acquisitions and Evolution

Security Dynamics Technologies, Inc. was founded in 1984 and developed the initial SecurID authentication technology as a hardware-based token system for two-factor . In July 1996, Security Dynamics acquired RSA Data Security, Inc., a firm founded by the inventors of the , which integrated public-key capabilities with SecurID's token-based authentication; the company was subsequently renamed , Inc. This merger expanded RSA Security's portfolio beyond tokens to include broader solutions, with SecurID remaining a flagship product. Throughout the late and early , pursued growth through targeted acquisitions to enhance its and security offerings, including Xcert International, Inc. for digital certificate technology, International for , and Securant Technologies for e-business in 2000–2001. These moves bolstered SecurID's with systems like VPNs and web applications, evolving the product from standalone tokens to a more comprehensive suite. On September 18, 2006, Corporation completed its $2.1 billion acquisition of , approved by shareholders on September 14, positioning SecurID within EMC's information infrastructure ecosystem and emphasizing data protection synergies. EMC's ownership facilitated SecurID's adaptation to storage-centric security needs, but broader corporate shifts followed: Dell Technologies acquired EMC in September 2016 for $67 billion, incorporating RSA's identity solutions—including SecurID—into its hybrid cloud and portfolio. Under Dell, SecurID evolved to support cloud and mobile tokens amid rising cyber threats, such as the 2011 of RSA's SecurID seed data that prompted enhanced recovery and risk-based features. On September 1, 2020, Dell divested RSA Security to a consortium led by (STG) and including for approximately $6.4 billion, restoring RSA's independence and refocusing on identity-first security; this transition emphasized SecurID Access as a cloud-native, platform with AI-driven analytics. As of 2025, RSA operates as a standalone entity under STG, continuing SecurID's evolution toward zero-trust architectures and hybrid work environments.

Technical Principles

Core Mechanism of Time-Based One-Time Passwords

The RSA SecurID system generates time-based one-time passwords (TOTPs) using a shared symmetric secret key, known as the , unique to each authenticator . This is factory-programmed into hardware or software and securely imported into the RSA Authentication Manager server. Every 60 seconds, the 's internal clock derives a time interval from the Unix epoch (typically by integer division of the current by 60), which is then processed with the via a cryptographic to produce a pseudo-random numeric code, or tokencode, usually 6 to 8 digits long depending on the model. The algorithm itself remains proprietary to , with older implementations employing a custom function and newer ones utilizing AES-128 encryption in cipher block chaining () mode against the time interval (padded to 8 bytes in little-endian format) with a fixed of zero, followed by truncation or modulo operation to yield the displayable digits. This ensures the output appears unpredictable without knowledge of the seed, while between and relies on RSA's patented time-based mechanism, which aligns computations without requiring real-time network communication during generation. The resulting tokencode is combined with a user-known PIN to form the full passcode submitted for authentication. During verification, the authentication server recomputes the expected tokencode for the current 60-second window and typically adjacent windows (small, medium, or large offsets) to accommodate minor clock drifts between the token's and server time, a tolerance configurable per token record. If the submitted matches any valid window's computation using the stored , authentication succeeds; otherwise, it fails, preventing replay attacks as codes expire rapidly. This windowing mechanism, while introducing a narrow to brute-force guesses (e.g., up to three codes per attempt in larger windows), is mitigated by rate-limiting and the cryptographic strength of the seed-time pairing. Empirical data from deployments indicate high resistance to offline prediction, as seeds are 128-bit or longer and never transmitted.

Hardware and Software Token Variants

RSA SecurID tokens generate time-based one-time passwords (OTPs), known as tokencodes, using an internal synchronized with an server; users combine these with a (PIN) for . Hardware tokens consist of dedicated physical devices engineered for reliability and portability, while run as applications on user-owned devices, offering deployment flexibility at reduced cost. Both variants employ a 60-second for code generation and rely on a unique factory-encoded per token. Hardware tokens encompass models like the SID700 series, compact key fobs designed for keychain attachment with dimensions of 68.62 mm width, 20 mm height, and 10.59 mm thickness, weighing 16 grams. These feature a (LCD) showing 6-digit tokencodes, powered by a 3V coin cell , and operate within 0°C to 40°C temperatures at up to 95% humidity, meeting MIL-STD 810F ruggedization standards. The SID800 model adds a USB connector and embedded smart chip for storing Windows credentials or certificates and enabling automated tokencode input via USB, with slightly larger dimensions at 89.4 mm width and 21 grams weight, while retaining the LCD display, 60-second cycle, and comparable environmental resilience including USB 2.0 durability compliance. Additional hardware options include PINpad-integrated variants like the SID520 for on-device PIN entry and transaction signing capabilities in models such as the SID900. Software tokens, primarily distributed through the RSA Authenticator app for and devices, replicate tokencode generation via the host device's clock and seeded algorithm, eliminating physical shipment and enabling self-registration and automatic seeding. The app supports 6- or 8-digit OTPs for standard two-factor use, alongside cloud-based options like push notifications, without requiring separate . Unlike hardware tokens, software variants depend on device and life but allow for large deployments and with hybrid environments via features like support.

Authentication Server and Seed Management

The RSA Authentication Manager serves as the central component in the SecurID system, responsible for verifying one-time passwords generated by user during attempts. It maintains a secure database of token records, including each token's unique symmetric key, and employs time-synchronization to independently compute expected tokencodes matching those produced by the token or software. Upon receiving a user's PIN-prefixed tokencode via an agent or integrated application, the server generates candidate codes within a window—typically spanning several prior and future 60-second intervals—to account for minor clock drifts, then compares against the submitted value to approve or reject access. This architecture supports on-premises deployments as a on , with options for primary, replica, and proxy instances to enable and load balancing across enterprise networks. Seed management begins with the secure provisioning of unique symmetric keys during token manufacturing, where each or software receives a factory-generated that must be mirrored in the Authentication Manager's database for . Administrators import token records—encrypted files provided by upon purchase—into the via secure channels such as direct download from the my portal or like ordered through resellers, ensuring seeds are never exposed in during transit. For decryption, employs asymmetric key pairs where one key encrypts the seeds, and the customer-held private key enables server-side unlocking, a process audited to prevent unauthorized access. Once imported, seeds are assigned to specific users, enabling token activation; software tokens may use dynamic provisioning for over-the-air delivery, while variants require physical to maintain . Resynchronization, if needed due to prolonged desynchronization, involves administrative intervention or portals where users submit sequential codes, allowing the to realign its internal clock window without revealing the underlying . Security in seed management emphasizes isolation and auditing, as compromise of the seed database could enable offline prediction of tokencodes; thus, Authentication Manager implementations incorporate role-based access controls, encrypted storage, and integration with external for enhanced protection in mission-critical environments. Historical practices have evolved to mitigate risks, such as shifting from legacy file-based imports to automated, certificate-secured methods in modern versions like Authentication Manager 8.5, reducing in handling sensitive seed data.

Deployment and Features

Integration with Enterprise Systems

RSA SecurID integrates with enterprise systems through its Authentication Manager server, which serves as the core component for managing requests and token validation across networked environments. This server communicates with enterprise applications and infrastructure using standardized protocols such as for remote dial-in user service, enabling secure access to resources like VPN gateways, firewalls, and network switches. For instance, attributes—both standard and custom—are supported to pass details, allowing seamless enforcement of two-factor in environments requiring compliance with protocols defined in standards. Directory integration is facilitated via LDAPv3 compliance, supporting synchronization with enterprise identity stores including Active Directory and other LDAP-compliant servers that enable simple paged searches. This allows Authentication Manager to pull user identities, group memberships, and attributes for policy enforcement without duplicating user databases, reducing administrative overhead in large-scale deployments. External LDAP sources can be configured with search filters to map users precisely, ensuring compatibility with legacy and modern directory infrastructures. For custom and application-specific integrations, the RSA SecurID Authentication API provides a secure interface for agents to forward authentication requests to the server, supporting programmatic validation in enterprise software stacks. REST APIs are also available for user authentication, leveraging HTTP protocols to integrate with web-based services and microservices architectures. Additional protocols like SAML 2.0 enable federation with identity providers for single sign-on in systems such as Splunk Enterprise or Oracle Access Manager, where SecurID serves as the second factor. These mechanisms ensure broad interoperability while maintaining centralized control over token seeds and risk-based policies.

Advanced Capabilities and Modern Enhancements

RSA SecurID has evolved to incorporate -based services, enabling deployments that integrate on-premises with the for scalable, across distributed environments. Announced in March 2021, these enhancements facilitate accelerated adoption by supporting seamless connections via embedded Routers, allowing organizations to protect resources without full infrastructure overhauls. Further updates in RSA 8.8, released around 2023, introduced features for highly available setups and simplified Router deployments, enhancing flexibility in managing flows. By May 2025, updates improved security for Router and CAS communications, alongside live verification enhancements for real-time during . Modern software tokens via the RSA Authenticator represent a shift from hardware dependency, supporting dynamic one-time passwords, push notifications, and on and . The app, updated as of 2025, streamlines credential registration for up to 30 MFA or keys per user, with redesigned for easier management and reduced user friction. These capabilities extend to risk-based adaptive , where contextual factors like posture, location, and behavior dynamically adjust requirements, as integrated in RSA SecurID Access offerings since 2020 innovations that broadened protection. Additional enhancements include endpoint integration and passwordless options, such as biometric verification through the app, enabling organizations to enforce zero-trust principles without static tokens. July 2025 releases updated Identity Router to SLES 15 SP6 for improved OS-level in cloud-connected deployments. These developments prioritize empirical gains, like faster detection of anomalous authentications via enhanced in January 2025 updates, over legacy hardware reliance.

User Experience and Administrative Tools

Users interact with RSA SecurID primarily through a two-factor authentication process requiring a personal identification number (PIN) combined with a time-based one-time password (tokencode) generated by hardware or software tokens. Hardware tokens display the tokencode on an LCD screen, updated every 60 seconds, while software tokens, available as mobile applications for iOS, Android, and other platforms, generate tokencodes within the app interface after activation via a provided seed or QR code. Installation of software tokens involves downloading the app from official stores, accepting the license agreement, and importing the token file or scanning a QR code emailed or accessed via self-service portals, enabling rapid activation without physical distribution. The console enhances user autonomy by allowing individuals to request SecurID accounts, enable , and manage basic settings independently, reducing dependency on IT support for routine tasks. This approach supports a streamlined experience, particularly for software , where users can provision via QR codes or dynamic seeds, facilitating quick in large-scale deployments. However, user feedback in contexts highlights occasional friction from device compatibility or failures, though official integrations aim for seamless to applications without persistent software installation on personal devices where possible. Administrative tools center on RSA Authentication Manager, a server-based platform providing a web interface known as the Security Console for centralized management of users, tokens, authentication agents, and policies. Administrators use it to import token record files, assign SecurID tokens to users, and configure authentication methods, including multi-factor policies and risk-based adaptations. Provisioning capabilities include dynamic seed distribution for individual software tokens, bulk pushes to multiple users, and self-service options where predefined roles handle approvals and authenticator distribution. The platform supports role-based access for administrators, such as super admins for license management and token oversight, with features for enabling provisioning in settings and monitoring events. Integration with enterprise directories allows synchronized user management, while tools for importing and assigning ensure for organizations handling thousands of s daily.

Security Evaluation

Inherent Strengths and Empirical Effectiveness

RSA SecurID's core strength derives from its time-synchronized mechanism, which generates unpredictable codes using a proprietary seeded with a unique factory-generated value and the current Unix epoch time divided into 60-second intervals. This design renders codes computationally infeasible to predict or reuse beyond their brief validity window, as an attacker lacking the would need to brute-force approximately 10^6 to 10^8 possibilities per attempt, with server-side further thwarting offline or online guesses. The absence of reliance on public networks for code generation during enhances resilience against interception, distinguishing it from SMS-based alternatives vulnerable to SIM-swapping or exploits. Hardware tokens, such as key fob-style devices, embody a robust factor through tamper-resistant construction, where seeds are stored in secure memory inaccessible without physical destruction, preventing extraction via common reverse-engineering techniques. Empirical deployment data underscores this effectiveness: as a leading solution, RSA SecurID commanded 42.89% among two-factor tools as of April 2023, signaling sustained enterprise trust amid alternatives like or app-based OTPs. Broader MFA implementations, including SecurID variants, correlate with a 50% reduction in successful breach rates for adopting organizations, per industry analyses attributing gains to elevated barriers against and . Long-term operational resilience provides further evidence; since its commercialization in , SecurID has facilitated secure access for millions of users across sectors like and , with compromise incidents rare outside supply-chain disruptions like the 2011 seed theft, which exploited administrative lapses rather than algorithmic flaws. Post-mitigation, rotated seeds and enhanced risk analytics have sustained low unauthorized access rates in monitored environments, as affirmed by security practitioners evaluating its post-incident viability. This track record contrasts with higher-vulnerability software tokens, where sideloading or can more readily compromise shared secrets, highlighting 's causal advantage in causal isolation of the authentication factor.

Theoretical Vulnerabilities and Attack Vectors

The RSA SecurID system, while employing time-synchronized pseudorandom , possesses theoretical vulnerabilities stemming from its reliance on proprietary cryptographic functions and per-token seeds. A primary involves cryptanalytic exploitation of the underlying hash-like function, originally based on a weak susceptible to vanishing attacks. Researchers in demonstrated that, with access to one vanishing trace, the 64-bit secret key could be recovered in 2^48 SecurID encryptions, affecting a subset of keys observable over months of token outputs. Subsequent improvements reduced complexity for certain scenarios but highlighted the algorithm's non-standard design as a , prompting RSA's transition to AES-based variants by the mid-2000s. Hardware token extraction represents another vector, particularly through side-channel or fault-based methods enabled by physical . In , a targeting PKCS#1 v1.5 padding flaws in the SecurID 800 and similar models (including Aladdin eTokenPro and Feitian ePass variants) allowed recovery of symmetric keys in approximately 13 minutes, assuming possession and PIN knowledge. This exploit leverages error introduction in intercepted to iteratively reveal , compromising the seed and enabling code cloning; while RSA contested its practicality for OTP generation, the attack underscores hardware tokens' exposure to laboratory-style . Prediction attacks form a further theoretical concern, where of multiple timestamped codes could facilitate inference or future code if the pseudorandom function exhibits biases. Brute-force of 128-bit seeds remains infeasible without partial leaks (e.g., 2^40 trials yielding low success rates absent user data), but combined with userid, PIN, and recent codes, targeted becomes viable for high-value tokens using . Short code lengths (6-8 digits, ~10^6-10^8 possibilities) theoretically permit guessing within the 60-second window, though server-side synchronization and mitigate online attempts; offline replay is prevented by nonce-like time . Software token variants introduce device-level vectors, such as extraction of stored , amplifying risks in BYOD environments. Shoulder-surfing during code entry persists as a low-tech threat, despite rapid code rotation reducing replay windows, as visual observation of the dynamic component paired with PIN guessing enables immediate impersonation. Overall, these vectors emphasize the system's dependence on and algorithmic robustness, with no single mode dominating but cumulative risks elevated by physical or observational .

2011 Breach: Causes, Execution, and Immediate Consequences

The breach began with a spear-phishing campaign targeting RSA employees in early March 2011, utilizing emails with the subject line "2011 Recruitment Plan" that attached an Excel spreadsheet exploiting an undisclosed zero-day vulnerability in Adobe Flash. At least one recipient opened the attachment, which deployed a backdoor payload establishing remote access to the internal network without triggering alerts from RSA's security tools. This initial compromise exploited human error in a low-privilege environment, as the phishing evaded email filters and the Flash zero-day bypassed available patches, reflecting systemic vulnerabilities in endpoint protection and user training at the time. Once inside, the attackers, identified by RSA as an advanced persistent threat (APT) group sponsored by a nation-state , conducted to escalate privileges and laterally move across the network over several weeks. They exfiltrated roughly 40 megabytes of proprietary data, primarily seed values used to generate one-time passwords for SecurID hardware tokens, along with related and potentially a master encryption key, but spared serial numbers and customer lists to avoid immediate detection. RSA detected anomalous network behavior in but confirmed the theft's scope only after forensic analysis, with the operation's stealth enabled by custom that communicated via legitimate channels like servers. Immediate fallout included RSA's public disclosure on March 17, 2011, via an open letter from executive chairman Art Coviello, warning customers of potential risks to SecurID without initially detailing the stolen data's nature to prevent widespread panic or exploitation. EMC Corporation's stock declined approximately 4% in after-hours trading following the announcement, reflecting investor concerns over the breach's implications for RSA's core product. By June 2011, RSA acknowledged the seeds' compromise and offered free token replacements to all enterprise customers, incurring costs estimated at tens of millions, while urging heightened vigilance; no customer customer data or personal information was reported stolen, but the incident compromised federal systems using SecurID, such as those at the Departments of Defense and State.

Controversies and Impacts

Post-2011 Exploitation and Broader Ramifications

Following the March 2011 disclosure of the RSA breach, attackers exploited the stolen SecurID token seed data in targeted campaigns against high-value organizations, most notably defense contractor Lockheed Martin in May 2011. RSA confirmed that the compromised information enabled intruders to generate valid authentication codes for specific tokens, facilitating initial VPN access attempts; however, Lockheed's cyber kill chain defenses detected the intrusion early, preventing significant data exfiltration. Reports indicated similar attacks on at least two other unnamed U.S. defense contractors around the same period, leveraging the pilfered RSA data to bypass two-factor authentication, underscoring the breach's role as an enabler for advanced persistent threats (APTs) rather than enabling mass unauthorized access. The exploitation highlighted the fragility of centralized seed management in hardware token systems, where compromise of a vendor's database could cascade to thousands of downstream users without individual regeneration. RSA responded by offering token replacements to affected customers, incurring approximately $66 million in costs during the second quarter of alone for hardware swaps, customer monitoring, and remediation efforts; major clients, including large banks and firms like , accepted these at scale to restore confidence. While no evidence emerged of broad, successful post-breach token cloning beyond spear-phished targets, the incident eroded trust in proprietary -based , prompting selective regenerations for high-risk deployments and accelerating evaluations of or software-based alternatives. Broader ramifications extended to supply chain security paradigms across industries, revealing how attacks on security providers could undermine protections for entire ecosystems, including government and sectors. The served as a catalyst for enhanced scrutiny of vendor risk management, with empirical lessons emphasizing layered s—such as behavioral —over reliance on any single factor, even time-based one-time passwords (TOTPs). It also fueled debates on the limitations of deterministic systems against nation-state actors, later attributed by some analyses to Chinese intelligence operations seeking strategic footholds in networks, though RSA maintained that the stolen data pertained only to a subset of without full algorithmic compromise. Long-term, the event contributed to a diversification in adoption, reducing over-dependence on hardware while validating their residual efficacy when combined with vigilant monitoring, as evidenced by the contained outcomes in targeted exploits. Following the March 17, 2011, disclosure of the RSA SecurID , the U.S. Department of Homeland Security (DHS) coordinated closely with RSA, law enforcement, and the intelligence community to investigate the and implement strategies. DHS disseminated actionable indicators and guidance to federal agencies, reducing government-wide risk exposure from potentially compromised tokens, and shared protective measures with representatives from all 18 sectors. Secretary emphasized DHS's leadership in fostering a distributed cybersecurity , including partnerships with antivirus vendors and promotion of secure protocols adopted by entities such as and . Federal agencies, including those under the Cybersecurity Coordinator, , and , initiated probes into the breach's implications for government networks, where SecurID tokens facilitated access to unclassified systems across numerous departments. The incident heightened awareness of supply-chain vulnerabilities in systems, prompting advisory warnings—such as a June 2011 Information Assurance Directorate alert—that tokens issued before April 2011 carried elevated risks and required enhanced safeguards. No formal regulatory penalties were imposed on or its parent Corporation by agencies like the or Securities and Exchange Commission, reflecting the absence of personal data exposure that might trigger notification mandates. Legally, RSA absorbed substantial costs without facing major litigation; second-quarter 2011 expenses reached $66 million for token replacements, customer , and support, covering proactive distribution of new devices to affected users. Analysts noted potential contractual liabilities if customer systems proved unreliable due to stolen seed data, or secondary claims if downstream breaches traced back to compromised , but no large-scale class-action suits materialized publicly. RSA's issuance of nine specific hardening recommendations—such as alert and dual-factor enhancements—along with offers to replace up to 40 million , likely mitigated escalation to court. The breach indirectly spurred legislative discussions, with figures like Senator citing it as rationale for reforms in bills such as the Cybersecurity and Internet Freedom Act of .

Long-Term Mitigation Strategies

Following the 2011 breach, RSA implemented enhanced security measures for token seed manufacturing and distribution processes, including hardened IT infrastructure to prevent similar intrusions. These changes involved stricter access controls and segmentation of sensitive data handling, reducing the risk of centralized seed compromise in future operations. RSA launched a comprehensive token replacement program in June 2011, offering to authenticators with new to approximately 40 million users across affected customers, thereby invalidating stolen data and restoring system integrity without widespread immediate failures. Long-term, this evolved into protocols for periodic reseeding and hybrid deployment models, combining with software tokens that support offline capabilities and automatic synchronization to minimize single-point dependencies. Product enhancements shifted toward adaptive authentication, integrating risk-based powered by to evaluate factors such as user behavior, device fingerprinting, geolocation, and contextual threats during attempts. This approach dynamically adjusts authentication rigor—escalating to additional factors like or notifications for high-risk sessions—while allowing seamless access for low-risk ones, as deployed in RSA SecurID Access platforms. Empirical data from deployments show reduced false positives compared to static token-only methods, with drawing on threat feeds to preempt exploits targeting legacy seeds. Industry-wide, long-term strategies emphasized vetting for providers, including diversified MFA layering (e.g., combining with PKI or behavioral signals) to mitigate seed theft impacts, as evidenced by post-breach analyses recommending against over-reliance on any single vendor's proprietary algorithms. RSA's updates also incorporated cloud-orchestrated options, such as passwordless flows via FIDO2 standards in mobile apps, enabling scalability and resistance to without exposing static secrets. These measures, validated through ongoing customer remediation since 2011, have sustained SecurID's viability by addressing both cryptographic predictability and operational centralization vulnerabilities.

Reception and Market Position

Achievements in Adoption and Case Studies

RSA SecurID saw extensive adoption in settings, with RSA reporting between 10 million and 20 million deployed globally as of 2011. This scale reflected its dominance in hardware-based two-factor authentication, where estimated RSA's market share at around 40% for such during the same period. By 2003, the system had captured over 70% of the overall two-factor authentication market, establishing it as a standard for securing remote access in large organizations. Major corporations integrated RSA SecurID for critical operations, including telecommunications giants and , as well as defense contractor Technologies. , for instance, deployed RSA SecurID hardware tokens to enhance security for advanced online payment services, requiring users to combine a PIN with the token's dynamic code. These implementations underscored its role in protecting high-value transactions and network access across industries reliant on legacy VPN and application systems. In the , RSA SecurID gained traction among U.S. federal agencies and contractors, supporting for on-premises and environments. Its cloud variant achieved Moderate authorization in May 2022, enabling broader government adoption of secure cloud services while maintaining compliance with standards like Impact Level 2. RSA solutions have secured multiple civilian agencies, intelligence community operations, and state-level entities, with deployments scaling to millions of users in some federal contexts. A notable case involved a firm transitioning to RSA's cloud-based SecurID Access, yielding approximately $2 million in operational value through reduced costs and improved . This migration highlighted SecurID's adaptability for modern setups, allowing the firm to retire while retaining robust token-based for sensitive controls.

Criticisms from Users and Experts

Users have frequently criticized RSA SecurID for challenges, including difficulties in switching tokens between devices, such as when replacing a lost or upgraded , which requires manual re-provisioning without automatic linkage to corporate or accounts. Token failures are another common complaint, leading to repeated attempts and delays, particularly with tokens that can become desynchronized due to clock drifts or network issues. Experts and users alike have highlighted integration complexities, noting limited compatibility with diverse authentication ecosystems and legacy systems, which complicates deployment in heterogeneous environments. Hardware tokens have been described as bulky and inconvenient for daily carry, while software tokens introduce risks if devices are lost or compromised, exacerbating dependency concerns. Login delays and intermittent failures, such as prompts requiring multiple entries of credentials or OTPs, further frustrate end-users during high-stakes access scenarios. The 2011 data breach significantly eroded user confidence, with customers expressing anger over RSA's initial downplaying of the incident's severity, which involved the theft of records for up to 40 million , enabling potential brute-force attacks on PIN-protected authenticators. Security researcher critiqued RSA's post-breach communications as inadequate and opaque, arguing that reliance on third-party security measures undermined transparency about residual risks. Broader expert analyses have pointed to SecurID's model as illustrative of two-factor authentication's supply-chain vulnerabilities, where compromise of the token issuer can cascade to downstream users without inherent mitigations like token rotation. Cost remains a persistent grievance, with implementation and maintenance expenses deemed high relative to alternatives, including hardware procurement, administrative overhead for token management, and upgrades post-breach. Mobile compatibility issues, such as inconsistent app performance across OS versions or delays in code generation near timer expiration, compound operational frustrations for remote workers. Despite overall positive ratings in user aggregates, these criticisms underscore ongoing tensions between SecurID's enterprise-scale security and practical deployment realities.

Alternatives and Comparative Analysis

Alternatives to RSA SecurID include other hardware-based (OTP) generators from vendors such as Thales (formerly ), software-based time-based OTP (TOTP) applications like or Authenticator, push notification systems such as Duo Security, and phishing-resistant hardware security keys adhering to FIDO2 standards, exemplified by Yubico's . In terms of security, RSA SecurID's proprietary time-synchronized OTP mechanism shares cryptographic seeds that, if compromised, enable offline generation of codes, as demonstrated in historical breaches; this contrasts with FIDO2-compliant keys like , which employ for challenge-response without exposing shared secrets, rendering them resistant to and man-in-the-middle attacks. Software TOTP apps mitigate some costs but inherit device-level vulnerabilities, such as malware extraction of seeds, while push methods like Duo's reduce user friction but rely on secondary channels susceptible to SIM swapping or app compromise. NIST guidelines emphasize higher-assurance authenticators like hardware-bound cryptographic tokens for environments requiring , positioning FIDO2 methods above OTP in assurance levels due to their to remote credential theft.
AspectRSA SecurID (Hardware OTP)YubiKey (FIDO2 Hardware)Software TOTP (e.g., Google Authenticator)
Phishing ResistanceLow (susceptible to real-time relay)High (public-key, no shared secret)Low (seed extractable via malware)
Cost per UserHigh (physical tokens ~$20-50)Moderate (~$20-60, reusable)Low (free apps)
Deployment ScalabilityStrong for legacy enterprise integrationsBroad compatibility via standardsEasy, but requires device management
UsabilityRequires token carry/syncPlug-and-tap convenienceApp-based, but clock sync issues
Usability favors software and push alternatives for mobile-first users, though hardware OTP like SecurID demands physical possession and battery maintenance, potentially hindering adoption in dynamic environments. Empirical deployment data indicate FIDO hardware excels in cost efficiency over time for high-security needs due to multi-protocol support and lower replacement rates, whereas OTP systems like SecurID integrate deeply with on-premises VPNs but lag in modern cloud-native phishing resistance.

References

  1. [1]
    History of RSA Security Inc. - FundingUniverse
    1977: Public-key encryption is developed by Ronald Rivest, Adi Shamir, and Leonard Adleman at the Massachusetts Institute of Technology. · 1982: Rivest, Shamir, ...
  2. [2]
    SecurID | RSA Secure Access and Authentication
    SecurID products are part of the AI-powered RSA Unified Identity Platform combining automated identity intelligence, authentication, access, governance.
  3. [3]
    [PDF] RSA SecurID® Authenticators
    Each RSA SecurID authenticator has a unique symmetric key that is combined with a proven algorithm to generate a new one-time password (OTP) every 60 seconds.
  4. [4]
    RSA SecurID Tokens - HECC Knowledge Base
    Jan 14, 2019 · RSA SecurID tokens provide secure authentication for NASA supercomputing. They come in hard (fob) and soft (app) forms, generating tokencodes ...<|separator|>
  5. [5]
    The Full Story of the Stunning RSA Hack Can Finally Be Told - WIRED
    May 20, 2021 · RSA's SecurID tokens were designed so that institutions from banks to the Pentagon could demand a second form of authentication from their ...
  6. [6]
    Malicious Life Podcast: The Untold Story of the RSA Breach Part 1
    In March of 2011, security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecurID product.
  7. [7]
    OBITUARY: Kenneth P. Weiss, 82 - Marblehead Current
    Feb 17, 2025 · Kenneth P. Weiss, a pioneering entrepreneur, human factors engineer and esteemed inventor, passed away peacefully at the age of 82 on Feb. 8.
  8. [8]
    Dr. Kenneth P. Weiss - Lifeboat Foundation Bios
    Kenneth P. Weiss, Ph.D. founded Security Dynamics in 1984 and served as CEO until 1986 and Chairman of the Board and CTO until 1996. The company's security ...
  9. [9]
    Online Security Company to Buy RSA - SFGATE
    Apr 16, 1996 · RSA Data yesterday agreed to be acquired by Security Dynamics Technologies in a marriage that combines two leaders in the fast growing field ...
  10. [10]
    Security Dynamics to Purchase RSA Data Security
    On April 15, Security Dynamics, a leading U.S. maker of smart cards for authentication, agreed to purchase RSA Inc., for approximately $200 million, ...
  11. [11]
    RSA SecurID | DevOps and Infrastructure - Howdy
    RSA SecurID was developed by RSA Security, a company known for its expertise in cryptography and network security. It was introduced in 1986 to address the need ...
  12. [12]
    From James T. Kirk to data security with privacyIDEA - Univention
    Apr 29, 2015 · Nevertheless, it took a further four years before the RSA launched the first SecurID token on the market in 1986, with the aim of helping to ...
  13. [13]
    [PDF] Cryptanalysis of the Alleged SecurID Hash Function (extended ...
    The core of the authenticator is the proprietary SecurID hash function, de- veloped by John Brainard in 1985. This function takes as an input the 64-bit.
  14. [14]
    software version of the RSA SecurID? - Server Fault
    Sep 4, 2009 · The original SecurID, first introduced in 1987, used a proprietary John Brainard algorithm to hash a 64-bit token-specific secret and ...<|control11|><|separator|>
  15. [15]
    Microsoft, RSA Data Security and Security Dynamics Announce ...
    Aug 21, 1996 · Acquired in July 1996 by Security Dynamics, RSA Data Security Inc. is a recognized world leader in cryptography and developer tools for security ...
  16. [16]
    EMC Completes RSA Security Acquisition Announces ... - Dell
    Sep 18, 2006 · RSA Security stockholders approved the acquisition on Thursday, September 14, 2006. EMC also announced it has signed a definitive agreement to ...
  17. [17]
    Dell puts RSA on the block - Blocks and Files
    Jan 3, 2020 · Dell inherited RSA when it bought EMC for $67bn in 2016. EMC bought RSA for $2.1bn in 2006. Secure storage. The storage-security combination ...<|separator|>
  18. [18]
    RSA® Emerges as Independent Company Following Completion of ...
    Sep 1, 2020 · Today marks the close of the acquisition of RSA by a consortium led by Symphony Technology Group (STG), Ontario Teachers' Pension Plan Board ( ...Missing: history evolution
  19. [19]
    About RSA | The Security-First Identity Leader
    RSA provides the identity capabilities and insights organizations need to secure access, automate lifecycle, reduce risk, and maintain compliance.
  20. [20]
    [PDF] RSA SecurID Quick Reference Card - Ginnie Mae
    Each RSA SecurID authenticator has a unique symmetric key that is combined with a proven algorithm to generate a one-time password (OTP) every 60 seconds.
  21. [21]
    [PDF] Understanding RSA Security
    RSA supports a broad range of hardware and software authenticators including one-time passcode (OTP) credentials, FIDO, mobile push, and embedded biometrics ...
  22. [22]
    RSA SecurID hardware token reverse engineering - Make or break
    Jul 4, 2021 · The serial number and expiration date of the token are printed on a piece of rubber on the back of the token that is easily removed to ...<|control11|><|separator|>
  23. [23]
    How RSA Authentication Manager Protects Your Resources
    RSA Authentication Manager uses multi-factor authentication, including SecurID tokens and on-demand authentication, to protect resources by verifying user ...Integrating Authentication... · Multifactor Authentication · The Role Of Rsa...
  24. [24]
    SecurID | WeizmannIT - Weizmann Institute of Science
    One such technology, SecurID OTP (One Time Password), is a time-based, server synchronized mechanism that issues a temporary password, which can be used only ...
  25. [25]
    [PDF] rsa-securid-hardware-tokens-technical-specifications-012621.pdf
    The RSA SecurID SID700 models are key fob styles that can be affixed to a key chain and offer extreme durability in a reliable and easy to carry form. The RSA ...Missing: variants | Show results with:variants
  26. [26]
    RSA SecurID | Specs, reviews and EoL info - InvGate
    RSA SecurID offers robust multi-factor authentication, combining PINs and tokens for secure access across diverse environments.Missing: technology | Show results with:technology
  27. [27]
    RSA Authenticator (SecurID) on the App Store
    Rating 1.7 (14) · Free · Business/ProductivityWith the Authenticator app, you can use either OTP credentials or additional cloud-based MFA for authentication. • SecurID software OTP Credential generate ...
  28. [28]
    RSA SecurID Software Tokens - TokenGuard.com
    Cost-effective and convenient alternative to a hardware token · Software tokens to support multiple device types such as mobile phones, tablets and PCs · Secure ...Missing: variants | Show results with:variants
  29. [29]
    What is RSA SecurID and use cases of RSA SecurID?
    Sep 26, 2023 · RSA SecurID typically involves the use of hardware or software tokens that generate one-time codes at regular intervals. Users must enter these ...Missing: mechanism | Show results with:mechanism
  30. [30]
    RSA SecurID Authentication Process
    The RSA SecurID authentication process involves the interaction of three distinct products: RSA SecurID authenticators, also known as tokens, which generate ...
  31. [31]
    How to download your token seed files from myRSA - RSA Community
    This article provides instructions to download your token seed file from myRSA. Tasks Before attempting to download files from my.rsa.com disable any Pop-Up ...Missing: process | Show results with:process<|separator|>
  32. [32]
    New Delivery Method for Token Seed Records - RSA Community
    Token seed records can now be downloaded directly from myRSA, or requested on CD when ordering with a reseller or RSA Account Manager.Missing: management | Show results with:management
  33. [33]
    Token Seed Decrypt options with on-Prem Authentication Manager ...
    Jun 26, 2025 · To encrypt token seed records for a customer, RSA creates a key pair. RSA encrypts with one of the keys, and RSA delivers the other key to the ...
  34. [34]
    Assign and Distribute a Software Token to a User Using Dynamic ...
    Click Assign Token(s). · From the Select Token Profile drop-down list, select a software token profile with dynamic seed provisioning as the delivery method.Missing: management process
  35. [35]
    Resyncing RSA SecurID tokens using RSA Authentication Manager ...
    This article provides information on how to resynchronize a SecurID hardware or software token from the Authentication Manager 8.1 Self-Service Console.
  36. [36]
    [PDF] RSA SecurID® Access RSA Authentication Manager 8.5
    RSA Authentication Manager is tremendously flexible in meeting highly secure, on-premise and mission-critical application environments. When the secure proxy ...
  37. [37]
    Deploying RSA SecurID Tokens - RSA Community - RSA Security
    To deploy RSA SecurID tokens, import a token record, assign tokens to users, and distribute them either physically or by mail.Missing: management process
  38. [38]
    RADIUS for Cloud Access Service Overview - RSA Community
    RSA offers a streamlined RADIUS authentication experience for users with access to both the SecurID OTP and Authenticate OTP methods.
  39. [39]
    RADIUS User Attributes - RSA Community
    RSA RADIUS supports standard and custom RADIUS attributes. Standard. Attributes with fixed names and assigned ID numbers specified by the RADIUS protocol. For ...
  40. [40]
    Identity Sources for Cloud Access Service - RSA Community
    Supported Directory Servers​​ CAS supports Microsoft Active Directory and LDAPv3 directories. The LDAPv3 servers must support Simple Paged Search. Your LDAP ...
  41. [41]
    How to create an external LDAP identity source in RSA ...
    This article explains how to create, configure or set up an external LDAP identity source to Active Directory or aother supported LDAP database server from ...I. Identity Source Basics · Ii. Active Directory Options · B. Ldap Search Filters
  42. [42]
    Configure the RSA SecurID Authentication API for ... - RSA Community
    To use both the Access ID and the Access Key, you can enable an Hash-based Message Authentication Code (HMAC) mode for the RSA SecurID Authentication API. The ...Missing: SHA1 AES
  43. [43]
    RSA Authentication Manager - TechDocs - Broadcom Inc.
    Oct 16, 2024 · The following protocols are supported by the RSA Authentication Manager server for user authentication with REST APIs: Hypertext Transfer ...
  44. [44]
    Splunk Enterprise - RSA Ready Implementation Guide
    This guide describes Splunk Enterprise integration with RSA (or ID Plus) using SAML 2.0. Use this information to determine which use case and integration type ...Missing: systems | Show results with:systems
  45. [45]
    44 Integrating RSA SecurID Authentication with Access Manager
    The SecurID tokens or key fobs must be provisioned with the Authentication Manager by providing it with the token seed records. Each user name must be ...
  46. [46]
    New SecurID Enhancements Accelerate Your IAM Journey to the ...
    Mar 11, 2021 · SecurID, the trusted identity platform, announced key enhancements that will help organizations accelerate their cloud journeys.
  47. [47]
    RSA Announces the Release of RSA Authentication Manager 8.8
    This release delivers a host of new features and enhancements designed to boost security, improve flexibility, and simplify identity management. New Features ...Missing: capabilities | Show results with:capabilities
  48. [48]
    RSA May 2025 Release Announcements
    Cloud Authentication Service Updates · Improved Security for IDR and CAS Communication · Live Verification Enhancements · Streamlined Passwordless Identity ...Rsa Authenticator App... · Stay Secure: Mandatory Rsa... · Important Notice: Use Of...Missing: 2020-2025 | Show results with:2020-2025
  49. [49]
    RSA Authenticator (SecurID) - Apps on Google Play
    Rating 3.2 (17,568) · Free · AndroidSecure your digital life and streamline access with the RSA Authenticator App. Designed for enterprises and highly regulated industries.
  50. [50]
    New Innovations in RSA® SecurID Access Help Organizations ...
    Aug 11, 2020 · New RSA SecurID® Access offerings accelerate cloud adoption, broaden device protection, and reduce friction for admins and users.
  51. [51]
    RSA July 2025 Release Announcements
    RSA released an updated Identity Router (IDR) version 12.22.x with the SLES 15 SP6 operating system (OS) image in November 2024, available for both standalone ...Coming Soon (july Release) · Rsa Mfa Agent For Windows 2... · Operating System (os) Update...
  52. [52]
    RSA January 2025 Release Announcements
    These enhancements enable faster identification of suspicious authentication attempts, especially when the user ID does not match any known users, signaling ...Missing: 2020-2025 | Show results with:2020-2025
  53. [53]
    SecurID Tokens | RSA Community
    RSA SecurID tokens offer RSA SecurID two-factor authentication. An RSA SecurID token is a hardware device or software-based security token that generates a 6- ...Missing: features | Show results with:features
  54. [54]
    [PDF] RSA SecurID® Software Tokens iOS User Guide - vdi.nsf.gov
    After installing, open the RSA SecurID® Software Token mobile app on your device. The License Agreement will appear upon launch. Tap, Accept. Afterwards, the ...
  55. [55]
    [PDF] RSA SecurID Software Token Installation and User Guide - Mastercard
    Jul 18, 2024 · Organizations that choose to use RSA SecurID software tokens for two-factor authentication will need to download and install a small client.
  56. [56]
    Self-Service Console User Experience - RSA Community
    You can allow users to perform the following tasks on the Self-Service Console: Request a Self-Service account. Request and enable a SecurID token. Provide ...
  57. [57]
    RSA SecurID Access - TokenGuard.com
    RSA SecurID Access enables organizations to empower employees, partners, contractors and customers to do more without compromising security or convenience.Missing: enhancements | Show results with:enhancements
  58. [58]
    Integrating RSA SecurID with Server Suite - Delinea Platform
    Seamless User Experience: The integration ensures a seamless user experience. Users authenticate using their RSA SecurID credentials, while the Delinea ...
  59. [59]
    Getting Started with RSA Authentication Manager
    With Authentication Manager, you can deploy and manage RSA SecurID hardware and software tokens, administrators, users, and authentication agents. Perform ...
  60. [60]
    Distribute One Software Token Using Dynamic Seed Provisioning
    In the Security Console, click Authentication > SecurID Tokens > Manage Existing. Use the search fields to find the software token that you want to distribute.
  61. [61]
    Provisioning Overview | RSA Community
    Provisioning includes predefined administrative roles that you can assign for managing authenticators, approving requests, and distributing authenticators.
  62. [62]
    Administrative Accounts - RSA Community
    Requesting RSA to create additional Super Administrator accounts for the RSA SecurID ... Downloading RSA Authentication Manager license files or RSA Software ...Missing: tools | Show results with:tools
  63. [63]
    Enable Provisioning | RSA Community
    In the Security Console, go to Setup > Self-Service Settings > Enable or Disable Self-Service Features. Select Enable Provisioning Features. Click Save.
  64. [64]
    [PDF] RSA Authentication Manager 8.7 Planning Guide - Carahsoft
    Web access RSA SecurID protects access to web pages. Wireless Networking Authentication Manager includes an 802.1- compliant RADIUS server.<|separator|>
  65. [65]
    What is RSA SecureID? | Barracuda Networks
    RSA SecureID is a two-factor, public-key encryption authentication using a password/PIN and a hardware token (USB, smart card, or fob).
  66. [66]
    Two Factor Authentication Statistics, Insights And Facts 2025
    Sep 24, 2025 · ... RSA SecurID leads with 42.89% as of April 2023. ... Software and government, on the other hand, have registered 27% adoption rates, showing an ...
  67. [67]
    Multi Factor Authentication Software Statistics 2025 - LLCBuddy
    Mar 23, 2025 · MFA adoption is linked to a 50% reduction in successful breaches for companies that require it. Check our llc formation guides: Florida ...
  68. [68]
    Some Random Thoughts On RSA Breach - hackmageddon
    Apr 10, 2011 · RSA SecurID technology continues to be a very effective authentication solution. Whoever attacked RSA has certain information related to the RSA ...Missing: rates prevention<|control11|><|separator|>
  69. [69]
    [PDF] Improved Cryptanalysis of SecurID - Cryptology ePrint Archive
    Oct 21, 2003 · In this paper, we first go through a deeper analysis of the [1] algorithm, giving further justification of their conjectured running time of 248 ...
  70. [70]
    RSA SecurID 800 Token Attack Detailed By Researchers
    Jun 26, 2012 · Cryptographic attack requires as little as 13 minutes to compromise a token's secret key, and works against at least eight types of ...Missing: vectors | Show results with:vectors
  71. [71]
  72. [72]
    Quantifying the Unknown: Measuring a Theoretical SecurID Attack
    Mar 22, 2011 · A SecurID attack requires multiple pieces of information, including user info, PIN, and possibly token seeds. If seeds are compromised, the ...
  73. [73]
    The RSA Hack: How They Did It - The New York Times
    Apr 2, 2011 · In the attack on RSA, the attacker sent “phishing” e-mails with the subject line “2011 Recruitment Plan” to two small groups of employees over ...Missing: vector | Show results with:vector
  74. [74]
    RSA's SecurID Breach Started with Phishing Email - eWeek
    RSA's Art Coviello told analysts that the SecurID attackers used a phishing email with a malicious Excel spreadsheet to penetrate the company's network.
  75. [75]
    'Tricked' RSA Worker Opened Backdoor to APT Attack
    RSA unveiled on March 17 that an attacker targeted its SecurID two-factor authentication product in what it termed an advanced persistent threat breach (see ...Missing: controversies | Show results with:controversies
  76. [76]
    RSA Spear phishing attack | Zoho Workplace
    Nov 15, 2023 · Explore the RSA Security breach of 2011, a sophisticated cyberattack involving spear phishing, APTs, and SecurID token compromise.Missing: prediction | Show results with:prediction
  77. [77]
    RSA details March cyberattack, blames “nation state” for SecurID ...
    Oct 12, 2011 · RSA executive chairman Art Coviello said at a press conference that two separate hacker groups worked in collaboration with a foreign government ...
  78. [78]
    [PDF] The March 2011 RSA Hack
    Part 3: Grab the money and run! ➢ Monitor inbound and outbound traffic (digital shoulder surfing). ➢ Privilege escalation → Higher ranking employee accounts. ➢ ...
  79. [79]
    SecurID Company Suffers Security Breach - The New York Times
    Mar 17, 2011 · The RSA Security unit of EMC said that a data breach might compromise computer security products used by corporations and governments.Missing: causes | Show results with:causes
  80. [80]
    RSA warns SecurID customers after company is hacked - CSO Online
    Mar 17, 2011 · EMC's RSA Security division says the security of the company's two-factor SecurID tokens could be at risk following a sophisticated cyber-attack ...
  81. [81]
    RSA finally comes clean: SecurID is compromised - Ars Technica
    Jun 6, 2011 · RSA is working with other customers believed to have been attacked as a result of the SecurID compromise, though it has not named any. Defense ...Missing: controversies | Show results with:controversies<|control11|><|separator|>
  82. [82]
    Security firm RSA offers to replace SecurID tokens - BBC News
    Jun 7, 2011 · In an open letter to customers, external, RSA executive chairman Art Coviello confirmed that "information taken from RSA in March had been ...<|separator|>
  83. [83]
    RSA security breach compromised federal network ID tool - Nextgov
    | March 21, 2011. Company's authentication tool is used by Defense, Homeland Security and State departments, among others. ... RSA Executive Chairman Art Coviello, who sent the message, did note that no personal information was evidently compromised.
  84. [84]
    RSA verifies its tokens played role in Lockheed cyberattack
    Jun 7, 2011 · RSA Security has confirmed that stolen data about the company's SecurID authentication token was used in the recent attack against defense contractor Lockheed ...Missing: ramifications theft
  85. [85]
    More cyberattacks reported; RSA tokens likely involved
    Jun 1, 2011 · The L-3 attack was reported May 27 by Reuters, which said attackers reportedly were able to spoof the passcode from an RSA SecurID token. Fox ...<|control11|><|separator|>
  86. [86]
    RSA SecurID Breach Cost $66 Million - Dark Reading
    EMC details second quarter 2011 cost to replace tokens, monitor customers, and handle fallout from RSA's SecurID breach.
  87. [87]
    RSA Security Faces Angry Users Over Breach - The New York Times
    Jun 7, 2011 · RSA has said that in its own breach, the hackers did this by sending “phishing” e-mails to small groups of employees, including one worker who ...
  88. [88]
    RSA Compromise: Impacts on SecurID - Secureworks
    Mar 17, 2011 · RSA announced that a cyberattack resulted in the compromise and disclosure of information specifically related to RSA's SecurID two-factor authentication ...Missing: early adopters
  89. [89]
    RSA SecurID attack shows the importance of protecting critical assets
    Feb 23, 2023 · The RSA SecurID breach was a highly sophisticated cyberattack that occurred in March 2011, in which hackers accessed the computer systems of RSA ...
  90. [90]
    Gauging The Long-Term Effects Of RSA's Breach - Dark Reading
    More than eight months after the RSA SecurID breach bombshell was dropped on the industry, security professionals still whisper among themselves about the long ...Missing: empirical effectiveness
  91. [91]
    DHS Responds to RSA SecurID Breach - BankInfoSecurity
    The Department of Homeland Security is working with RSA in investigating what the IT security vendor characterized as an extremely sophisticated attack aimed at ...Missing: controversies | Show results with:controversies
  92. [92]
    Napolitano Outlines DHS Response to RSA Breach - BankInfoSecurity
    The secretary said it's DHS's responsibility to lead the protection of critical infrastructure and its connections to cyberspace. "This is not something we can ...
  93. [93]
    U.S. agencies respond to cyberattack on information security firm
    Mar 23, 2011 · Federal agencies are investigating the potential effects of a cyberattack against one of the nation's largest information security firms.Missing: response | Show results with:response
  94. [94]
    [PDF] INFORMATION ASSURANCE DIRECTORATE
    Jun 8, 2011 · New evidence has surfaced indicating that the risk of relying upon RSA SecurID tokens issued prior to April 2011 as a second form of ...<|separator|>
  95. [95]
    RSA Breach: A Legal View - BankInfoSecurity
    RSA Breach: A Legal View · What the news means to customers and to the security industry; · Potential legal ramifications; · What RSA SecurID customers can do now.
  96. [96]
    RSA Breach: Eight Months Later - Dark Reading
    More than eight months after the RSA SecurID breach bombshell was dropped on the industry, security professionals still whisper among themselves at the long- ...
  97. [97]
    RSA Agrees to Replace Security Tokens After Admitting Compromise
    Jun 7, 2011 · Nearly three months after RSA Security was breached by hackers, the company has announced it will replace the security tokens for nearly all of its SecurID ...Missing: enhancements | Show results with:enhancements
  98. [98]
    Learn About Risk-Based Authentication - RSA Security
    Risk-based authentication answers the question by making access easier or more difficult, depending on the risk an access attempt poses.
  99. [99]
    Risk-Based Authentication | RSA Community
    Risk-based authentication (RBA) identifies potentially risky or fraudulent authentication attempts by silently analyzing user behavior and the device of origin.
  100. [100]
    SecurID: Hybrid Identity Management - RSA Security
    For added security and improved usability, SecurID uses machine-learning behavioral analytics, business context and threat intelligence to draw a ...
  101. [101]
    SecurID Mobile App Upgrades Simplify User Experience, Reduce ...
    Jan 26, 2022 · That improvement can add up to significant savings: for larger businesses, nearly 50% of IT help desk costs are allocated to password resets. By ...
  102. [102]
    RSA: Life After Breach - Infosecurity Magazine
    Aug 12, 2011 · RSA fell victim to an advanced persistent threat (APT) attack, which succeeded not only in penetrating RSA's computer network, but in extracting ...Missing: excluding | Show results with:excluding
  103. [103]
    Multi-Factor Authentication Market To Hit USD 49.7 Bn
    Mar 20, 2024 · Despite this, RSA SecurID maintained a dominant position in the two-factor authentication market, holding over 70% market share as of 2003.
  104. [104]
    Companies Currently Using RSA SecurID Suite - HG Insights
    Companies Currently Using RSA SecurID Suite ; AT&T Inc. att.com, Dallas ; Verizon Communications Inc. verizon.com, New York ; Raytheon Technologies Corporation.
  105. [105]
    RSA SecurID® Device - Wells Fargo
    The RSA SecurID device provides an extra layer of security for Wells Fargo customers using our advanced online payments services, including Direct Pay.<|control11|><|separator|>
  106. [106]
    [PDF] SecurID for Public Sector - RSA Security
    Long trusted by government for on-premises authentication, RSA is committed to supporting federal agencies, public sector organizations and approved federal.
  107. [107]
    SecurID Receives FedRAMP Moderate Authorization - Business Wire
    May 4, 2022 · The RSA cloud-based FedRAMP solution, offered by RSA Federal, is a government-wide program promoting the adoption of secure cloud services ...Missing: enterprises | Show results with:enterprises<|separator|>
  108. [108]
    RSA ID Plus for Government
    RSA ID Plus for Government is FedRAMP Moderate Authorized by the Joint Authorization Board (JAB), with DoD IL2 reciprocity, making it an ideal solution for ...
  109. [109]
    RSA - Data Security - Carahsoft
    RSA is FedRAMP JAB authorized for government use and secures multiple federal agencies, civilian agencies, the intelligence community, state and local ...
  110. [110]
    [PDF] 50 Reasons RSA SecurID® Access is the Best Choice for Modern ...
    RSA was first to introduce tokens for authentication. Today, we're pioneers in incorporating technology innovations into RSA SecurID Access. 49. We've had a ...Missing: early adopters
  111. [111]
    Case Study: Financial Services Firm Moves Identity to Cloud - RSA
    Read the RSA case study to see how moving identity capabilities to the cloud generated $2 million in value for a financial customer.Missing: adoption achievements
  112. [112]
    RSA SecureID Pros and Cons | User Likes & Dislikes - G2
    5 Cons or Disadvantages of RSA SecureID · 1. Data Security · 2. Expensive · 3. Integration Issues · 4. Login Issues · 5. Mobile Compatibility.Missing: experts | Show results with:experts
  113. [113]
    RSA SecurID Software Reviews, Pros and Cons
    Rating 4.6 (82) Cons: When switching phones it is very cumbersome to get a new account with the RSA token. It does not link to your company email which is a hassle.Missing: criticisms | Show results with:criticisms
  114. [114]
    RSA SecurID: Pros and Cons 2025 - PeerSpot
    Some users report frequent issues with token synchronization. Others note limited compatibility with other authentication systems. Hardware tokens can be bulky ...
  115. [115]
    On The RSA SecurID Compromise - Dan Kaminsky
    phishing attacks, compromised nodes, and physical monitoring of ...
  116. [116]
    RSA SecureID Reviews 2025: Details, Pricing, & Features - G2
    RSA SecurID has considerations: high costs for implementation, dependence on physical tokens or mobile apps posing risks if lost, integration complexities into ...Missing: expert weaknesses
  117. [117]
    Top RSA SecurID Competitors & Alternatives 2025 - Gartner
    Learn more about the top RSA SecurID competitors and alternatives. Read the latest reviews and find the best Access Management software.
  118. [118]
    RSA SecurID vs Yubico YubiKey comparison - PeerSpot
    Yubico YubiKey has an upper hand in cost efficiency and user convenience, while RSA SecurID excels in extensive integration capabilities for large organizations ...
  119. [119]
    7 Multi-Factor Authentication Solutions and Their Pros/Cons - Frontegg
    Aug 22, 2024 · ... options like Google Authenticator, Yubico, Duo Security, and RSA SecurID. Key features of OneLogin: Authentication methods: Supports ...
  120. [120]
    Compare SecurID vs Yubico YubiKeys on TrustRadius
    SecurID does a better job in Integration for legacy on-premise applications for instance. Yubico YubiKeys has been a leader in the security key market, and I ...
  121. [121]
    Multi-Factor Authentication | NIST
    Jan 10, 2022 · MFA is an important security enhancement that requires a user to verify their identity by providing more than just a username and password.Missing: empirical | Show results with:empirical
  122. [122]
    What Is a Hardware Token? Comparing Authentication Methods
    May 15, 2025 · Portability: Software tokens are highly portable and convenient, while hardware tokens require the user to carry an extra physical object. Cost: ...Missing: analysis | Show results with:analysis
  123. [123]
    Hard token vs. soft token: What's the difference? - Telnyx
    Mar 10, 2024 · Soft tokens are far less expensive to implement and operate than hard tokens. If you need the security of 2FA without the cost of security ...Missing: SecurID | Show results with:SecurID
  124. [124]
    RSA vs Yubico 2025 | Gartner Peer Insights
    Compare RSA vs Yubico based on verified reviews from real users in the User Authentication market, and find the best fit for your organization.
  125. [125]
    Hardware Tokens vs. Software Authentication: Which is More Secure?
    Oct 18, 2024 · Hardware tokens also have security advantages over the online connectivity needed for software keys, and so are less susceptible to cyber attack ...Missing: analysis | Show results with:analysis