11 Facts About RSA Security

1.

RSA Security LLC, formerly RSA Security, Inc and doing business as RSA, is an American computer and network security company with a focus on encryption and encryption standards.

FactSnippet No. 538,923
2.

RSA Security was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Leonard Adleman, after whom the RSA Security public key cryptography algorithm was named.

FactSnippet No. 538,924
3.

RSA Security is known for incorporating backdoors developed by the NSA in its products.

FactSnippet No. 538,925
4.

When EMC was acquired by Dell Technologies in 2016, RSA Security became part of the Dell Technologies family of brands.

FactSnippet No. 538,926
5.

RSA Security is based in Bedford, Massachusetts, with regional headquarters in Bracknell and Singapore, and numerous international offices.

FactSnippet No. 538,927
6.

On March 17, 2011, RSA Security disclosed an attack on its two-factor authentication products.

FactSnippet No. 538,928
7.

RSA Security later released a statement about the Dual_EC_DRBG kleptographic backdoor:.

FactSnippet No. 538,929
8.

From 2004 to 2013, RSA shipped security software—BSAFE toolkit and Data Protection Manager—that included a default cryptographically secure pseudorandom number generator, Dual EC DRBG, that was later suspected to contain a secret National Security Agency kleptographic backdoor.

FactSnippet No. 538,930
9.

RSA Security officials have largely declined to explain why they did not remove the dubious random number generator once the flaws became known, or why they did not implement the simple mitigation that NIST added to the standard to neutralize the suggested and later verified backdoor.

FactSnippet No. 538,931
10.

RSA Security officials responded that they have not "entered into any contract or engaged in any project with the intention of weakening RSA Security's products.

FactSnippet No. 538,932
11.

RSA Security is most known for its SecurID product, which provides two-factor authentication to hundreds of technologies utilizing hardware tokens that rotate keys on timed intervals, software tokens, and one time codes.

FactSnippet No. 538,933