

RSA SecurID® Access
Secure access from ground to cloud
Partner sales and marketing license upgrade guide


Authentication challenges for growing and large enterprises
Explore the common authentication challenges facing enterprises managing authentication over a WAN.


Authentication challenges for growing and large enterprises
Optimising performance across Wide Area Networks
Ensuring resilience and zero authentication downtime
Ensuring authentication is as unobtrusive as possible
Achieving secure and convenient access
Your largest customers operate from multiple offices over wide geographical areas, and need to successfully be able to authenticate large workforces consisting of thousands of employees.
This high scale of users and increased distance to the primary datacentre across a WAN can result in challenges relating to effective administration, authentication latency and overall workforce productivity.
Without replica instances of your authentication infrastructure, it can be challenging for enterprises to guarantee that their authentication requirements are online in the case of emergency or routine maintenance.
Authentication requires an active input from the user in order to verify they are who they say they are.
Without intelligent measures in place, this can result in lower productivity and avoidable frustration from the user.
Identity authentication requires specialist IT expertise, access to the right technologies and an understanding of today’s rapidly-evolving threats and trends. This can put already stretched IT resources under strain and lessen the ability to focus on other critical IT projects.
To help our partners solve this problem in an effective and profitable way, Tech Data offers a fully managed service that can be resold by channel partners.


Reselling Tech Data’s Recon Managed Identity Services
Utilise Tech Data’s security expertise and offer your customers a fully managed security service.


Tech Data’s Managed Identity service Recon is a cloud based service that allows Tech Data business partners to provide their customers with access to the expertise and support of skilled and certified RSA SecurID engineers.
This service allows security partners to develop their security services portfolio and provide a managed identity service without the need to invest upfront in training and infrastructure.
Recon Managed Identity offers flexible levels of support to match the individual requirements of your customers.
The service includes 24 x 7 x 365 support, updates, user management and reporting, all managed by Tech Data but white labeled by the partner. Tech Data engineers can deliver everything for partners from the beginning to the end and partners don’t have to worry about anything.
RECONTM Managed Identity Service
Setup
Help desk
Trouble shooting
Software support and updates
User and token management
Quarterly reporting


RSA SecurID® Enterprise and Premium license features
Discover how your enterprise customers benefit from upgrading their licenses to Enterprise or Premium.


Introducing RSA SecurID® Enterprise and Premium Licenses
For large scale enterprises or for those that are anticipating growth, opening new offices or acquiring businesses, RSA and Tech Data offer Enterprise and Premium SecurID Access licenses.
Why upgrade?
Improved scalability
Configuration and productivity features
Enhanced performance
Increased resilience
Lower overall TCO!
Improve performance, resilience and productivity across large networks with RSA SecurID® Access Enterprise
Upgrading to the SecurID Access Enterprise license provides your customers with access to up to 15 replica instances, allowing your customers to improve performance and resilience across large-scale or multi-site deployments.
Enterprise customers also gain access to Authentication Manager Bulk Administrator (AMBA), which greatly reduces the time to create new, amend or delete users and authentication requirements.
![]() |
Improve performance, resilience and productivity across large WANs by deploying up to 15 Authentication Manager (AM) replica instances |
![]() |
Reduce workloads with Authentication Manager Bulk Administration (AMBA) capabilities |
![]() |
Lower TCO through greatly reduced administration time and higher resilience |
Enterprise cloud customers receive additional access Policy Engine Attributes:
![]() |
IP Addresss |
![]() |
Authentication Type |
![]() |
Authentication Source |
![]() |
Country |
![]() |
Known Browser |
![]() |
Trusted Location |
![]() |
Trusted Network |
![]() |
User Agent |
Create the perfect balance of security and productivity with SecurID® Access Premium licenses
The highest tier of SecurID license - Premium - offers everything available in Enterprise, and additionally enhances the risk engine by adding Identity Confidence capabilities.
This feature improves user productivity and overall security by utilising machine learning and confidence scores across user behavior, device and location to prompt authentication when necessary.
As well as improving the experience for the user, this feature also allows you to determine the effectiveness of your security policies and utilise identity context parameters across individual use cases.
![]() |
Develop a dynamic risk-based identity assurance strategy, based on a range of contextual, risk and advanced authorization policies, further reducing the risk of friction from users. |
![]() |
Greater ability to map user-level or group-level identity risk factors to your organizational policies, improving security posture. |
Editions | Base | Enterprise | Premium |
1. What edition you need based on what you want to protect? | VPN & traditional on-prem agents | VPN & traditional on-prem agents | VPN & traditional on-prem agents |
SaaS, Cloud and SSO | SaaS, Cloud and SSO | SaaS, Cloud and SSO | |
Enterprise Scalability Multiple replicas, AMBA | Enterprise Scalability Multiple replicas, AMBA | ||
Risk-Based Analytics Contact, risk and adv. auth policies | |||
2. How do you want to protect it? | Mobile MFA OTP, push, device biometrics |
Mobile MFA OTP, push, device biometrics, FIDO |
Mobile MFA OTP, push, device biometrics, FIDO |
RSA SecurID® Tokens Hardware and Software |
RSA SecurID® Tokens Hardware and Software |
RSA SecurID® Tokens Hardware and Software |
|
3. How do you want to deploy and pay for it? | Perpetual or Subscription | Perpetual or Subscription | Subscription only |
Hybrid or All Cloud1 | Hybrid or All Cloud1 | Hybrid or All Cloud1 |
1 - Hybrid deployment required to use RSA SecurID tokens, traditional RSA SecurID agents, and/or the SSO agent


Enterprise and Premium use cases
Utilise these use cases and questions to identify opportunities with your customer


Local replica instances
Disaster Recovery
Manage spikes in demand
Quickly onboard large numbers
Improve security posture
Improve performance and reduce network latency by providing local replica instances
Challenge
Authentication performance can suffer when high numbers of users must log on from geographically remote offices across a WAN.
Potential use cases
Organisation is utilising base licenses and suffering from general latency/ performance issues at secondary sites
Organisation opens new secondary office or site
New sites acquired as part of corporate merger or buyout
Solution
![]() |
With RSA SecurID Access Enterprise and Premium, your customers can improve performance and reliability by locating replica instances physically closer to the users who require authentication. |
![]() |
An organization with a headquarters and multiple remote sites can reduce the distance-based latency and improve authentication performance by placing a SecurID Access replica instance at each remote site. |
Conversation starters
- Are your users facing a few seconds of delay when being faced with authentication?
- Do you have offices across multiple regions/countries?
- Do you have any upcoming plans to onboard a high number of staff in a new location?
(e.g. new office site or merger)
Disaster recovery and
maintenance
Challenge
Without replica instances, disaster recovery is limited. This could result in otherwise avoidable authentication downtime due to maintenance, power cuts, network outages or fire and flood damage.
Potential use cases
RSA SecurID Access Enterprise and Premium allows your customers to avoid suspending authentication by creating up to 14 replica instances that can be promoted to the primary instance as disaster recovery, if the primary instance is unresponsive, or as a temporary failover for maintenance.
By making sure deployments have sufficient instances installed to provide authentication while repairs are made, authentication can continue to take place while the primary instance is repaired or if a network connection between sites fails.
Solution
![]() |
Satellite office loses connection with HQ or main datacentre without causing local authentication downtime |
![]() |
Maintenance work required on primary instance doesn’t impact authentication capabilities |
![]() |
Replica instance fails over following fire, flood or blackout at primary or secondary site |
![]() |
Replica instances can support a sudden increase in the number of remote authentications when Business Continuity licenses are activated, leading to an unprecedented surge of users authenticating remotely, e.g. as seen with Covid-19. |
Conversation starters
- Have you had any instances of unplanned authentication downtime in the recent past?
- Do you have any backup capabilities for your authentication estate?
- What do you do to keep protecting users and data during planned downtime?
Scaling and managing high levels
of authentication
Challenge
As your customer’s business continues to grow, they must consider the size of their current user population and the anticipated size of their future user population to prepare for the increased demand for authentication.
Potential use cases
Prepare for spikes in demand, e.g. at the start of the day and after lunch, without reduced impact on performance.
Improve performance at remote sites with significant user populations.
Utilise bulk administrator (AMBA) to quickly onboard new users and ensure optimum ongoing performance.
Solution
![]() |
RSA’s SecurID Enterprise and Premium scalability features allow your customer to support growth and temporary peaks in demand. |
![]() |
As your customer’s business grows, a multiple replica instance installed on hardware that meets or exceeds the minimum system requirements can help to ensure they have excess capacity to handle increases in demand. |
Conversation starters
- Do you experience latency or performance issues at the start of the day or during spikes of activity?
- Is adding new users laborious and time-consuming?
- Do you have any upcoming plans to onboard a high number of staff in a new location? (e.g. new office site or merger)
Reduce manual admin with bulk
administrator (AMBA)
Challenge
Manual provisioning of new users, removal of old users and changes to policies and groups is a time-consuming and laborious task without automation capabilities.
Potential use cases
Quickly onboard and manage new users:
Onboard new departments, or even offices.
Quickly roll out SecurID across entire enterprise.
Scale from pilot quickly and efficiently.
Solution
![]() |
With Enterprise and Premium, your customers gain access to Authentication Manager Bulk Administration (AMBA). This tool greatly reduces the time required for administrators to manage users, groups, tokens and actions. |
![]() |
This greatly lowers operational costs and prevents administrators from having to manually add or amend users and distribute tokens one by one, allowing IT resources to be utilised on more strategic projects, upgrades and optimisation. |
Conversation starters
- How much time are your administrators spending managing users and groups?
- Are you in control of your expired users and old groups?
- Do you ever need to onboard or remove large numbers of users at one time?
Improve overall security posture and improve productivity with Identity Confidence
Challenge
Authentication every single time an application, network or device is accessed could result in a loss of productivity, especially if it takes a while to authenticate each time.
Potential use cases
Reduce friction with users by reducing requirement to authenticate.
Instantly identify suspicious out-of-ordinary behavior.
Improve security posture and make informed identity context driven risk management decisions.
Solution
![]() |
With Premium, your customers can leverage Risk Based Identity Confidence to authenticate based on levels of confidence accrued by reviewing user behaviour, location and device. |
![]() |
This reduces friction for users by silently reviewing in the background, only requesting authentication when the access confidence score is lower than required. This also allows for an active review of individual use cases and user sets to increase security confidence for key applications or access requirements such as CRM. |
Conversation starters
- Are your users authenticating at every login?
- Do you experience resistance around authentication from users?
- Can you determine the effectiveness of your security policies?


Sales and marketing resources
Utilise these pre-packaged co-brandable sales and marketing resources to help you create new opportunities for your business


Download your sales and marketing resources
On the below links you’ll find all the resources you need to quick-start your own marketing campaign. View additional tips and ideas across the other 3 tabs in this section.
Support your sales teams with this brochure
Co-brand this pre-built brochure to quickly provide your sales teams with a comprehensive RSA SecurID Access brochure.
You can utilise this brochure across multiple sales and marketing channels including:
![]() |
Emailing after a productive sales call |
![]() |
Adding to your website |
![]() |
Sending as part of a promotional email campaign |
![]() |
Training your sales teams |
![]() |
Handing out at events and roadshows |
![]() |
And more! |
Marketing Emails
Raise awareness and generate marketing leads with these email communications
Email: make sure your database is GDPR compliant!
![]() |
It’s vital that you maintain good data hygiene |
![]() |
Make sure you follow up with your prospects! |
![]() |
Place the RSA brochure behind a form to build up your database! |
Social Media: LinkedIn is the primary channel for B2B marketing
![]() |
46% percent of social media traffic to B2B company sites originates from LinkedIn* |
![]() |
79% of B2B Marketers agree that LinkedIn is an effective source for generating leads* |
Top tips
If you haven’t already, create a LinkedIn company page. You can then post content directly to LinkedIn and build up your audience.
Encouraging your colleagues to post on LinkedIn is a great way to show thought leadership and greatly improve reach.
*Source: LinkedIn


For more information contact us at cybersecurityeurope@techdata.com
Built with Prism Present
© Tech Data Corporation, 2020. Tech Data and Tech Data logo are registered trademarks of Tech Data Corporation in the United States and other countries. All other trademarks are the property of their respective owners.