RSA SecurID Software Authenticators

RSA SecurID Software Authenticators: Make strong authentication a convenient part of doing business by deploying software tokens on mobile devices—smartphones, tablets, and PCs—transforming them into intelligent security tokens.

bestel nu

Icon: Shield with Red Checkmark

SECURITY

SecurID Software Authenticators utilize the same industry-leading time-based algorithm used in RSA SecurID Hardware Authenticators.
Icon: Play Button Showing Lock and RSA Logo

SIMPLE, SECURE PROVISIONING

Software Authenticators can use a secure provisioning method that requires no transmission of confidential token information over the network and can securely bind a token to a device.
Icon: Paper Airplane with RSA Logo

END-USER CONVENIENCE

Software Authenticators reduce the number of productivity devices users have to manage for safe and secure access to corporate assets.
Icon: Three Shields with Human Silhouettes

INVESTMENT PROTECTION

Software Authenticators can be securely reissued when a user leaves the organization.
Icon: Four Red Shields on a Grid

FLEXIBLE CHOICE

RSA SecurID software tokens are available for a variety of smart phone platforms including BlackBerry,® iPhone,® Android,® Nokia,® Windows® Mobile, Java™ ME, and Symbian OS and UIQ devices,rsa toolbar token

rsa soft token

RSA SecurID software token for smartphones

rsa soft token pc en macRSA SecurID token for windows en Mac OSX

rsa toolbar software tokenRSA SecurID toolbar token