RES ONE SECURITY
A people-centric approach to security
RES ONE Security protects your business from external and internal threats with a unique people-centric approach to managing security, identity and access management, and governance. With RES, security doesn’t have to come at the cost of worker productivity or experience. To help meet security goals quickly, RES can deliver quick time to value – getting RES ONE Security up and running within days, not months or years.
RES ONE Security combines access controls, granular file-based whitelisting/blacklisting and read-only blanketing to limit admin privileges and prevent malware from being executed. RES can secure apps, websites, data, printers and IP connections, as well as USB removable storage devices. When it comes to access, choose what workers can and cannot do on company-issued devices, then implement granular contextual conditions including person, location, device, time of day and more. Grant admin rights to install or execute specific tasks based on a list of pre-approved trusted list or identity, protecting the organization by limiting the number of workers with admin privileges. Address BYOD or other mobile concerns by applying policies to individual mobile devices and integrating with your mobility management system to extend security.
RES ONE Security helps achieve compliance by tracking who has access to what data to ease the external or internal auditing process and prove that necessary controls are in place. RES allows you to open or restrict the management console for various admin roles and create on-demand configuration reports for auditors or business leadership, empowering individual application owners as needed. Report on deployed workspace details, such as changes, usage, devices, apps and configuration to evaluate future enhancements and identify potential gaps. To enforce license policies and ensure compliance with license agreements, monitor license usage throughout your organization.
RES ONE Security enables automated delivery of apps and services based on identity or policy, enabling secure worker onboarding and optimal provisioning for the IT organization. Because RES manages identities thorough a consolidated identity store integrated with HR, project management and other systems, access will change automatically if a worker changes roles or leaves the organization. Proper offboarding of employees, consultants or contractors ensures that all necessary IT credentials are deactivated such as privileges, access to corporate systems, apps and IT assets. Automation of manual tasks and integration of existing technologies allows IT to free up resources and take a more proactive and repeatable approach to provisioning and deprovisioning.
RES ONE Security keeps the digital workspace secure, while providing a web portal and mobile app to give IT a face to the business and to automate the delivery and removal of access to apps and services based on policy and approvals. Quick delivery of access through self service prevents workers from finding workarounds. For example, workers can securely reset and manage passwords themselves, eliminating service desk involvement and dramatically reducing costs. Also, RES allows workers to make requests on behalf of other workers, based on business policy. This allows a more flexible and comprehensive approach to request fulfillment – perfect for HR, assistants, management and the IT service desk.
Empowering the workforce, while securing the business
Control which workers can execute specific tasks within an app based on their identity and without granting full admin rights.
Control access rules based on granular contextual conditions (person, location, device, time of day, etc.), securing apps, websites, data, removable storage, printers and IP connections. This keeps data from being compromised because it was not access in a secure location – worker access to data can be limited (even if they have the credentials to do so) based on the level of risk.
Leverage log reports for auditors to prove access and policy controls are in place and to determine where data is or is not accessed.
Consolidated identity store
Unite data from multiple back end systems to create a single, customized identity for each worker, ensuring that workers and the business remain secure.
Whitelisting and blacklisting
Implement granular whitelisting and blacklisting for defense against ransomware and control over apps and files that can be executed.
Identity lifecycle management
Automate delivery and removal of apps and services based on identity or policy, enabling optimal provisioning and ensuring secure offboarding where all necessary worker credentials are deactivated.
Secure self service
Use a web and mobile app to give IT a face to the business, so users can review the apps, devices and services that they are qualified for and make requests in a secure and compliant way.
Conceal sensitive or personal data so that only those with proper qualifications or reason can view the personal data (for example, answers to password reset questions, salary information and social security numbers). This ensures that privacy is preserved, security controls are enforced and compliance with data protection regulations is maintained.
Check out what is in the latest releases.
RES ONE Security
Data masking (Access module)
conceal sensitive or personal data so that only those with proper qualifications or reason can view the personal data (for example, answers to password reset questions, salary information and social security numbers). This ensures that privacy
Service versioning (Access module)
track changes made to a service, including the workflow for streamlined management of processes and the added visibility into what changes have been made and who has made the changes. Also, helps to simplify and align DTAP processes.
Enhanced context awareness (Security module)
now supporting basic adaptive security policies for Mac and Linux.
Governance reporting (Governance module)
view historical data in detailed reports related to app usage and user activity to satisfy both internal and external audit requirements.
Related resourcesSEE ALL
Dig a little deeper
How can we help you with your next step? Fill out the brief inquiry form below, and we’ll get in touch with you shortly.
Thank you for your interest. A RES representative will contact you shortly.
Have questions? Contact RES