Feeds

VeriSign and IBM Team for hosted access, provisioning

Based on Tivoli

  • alert
  • submit to reddit

High performance access to file storage

ComputerWire: IT Industry Intelligence

Taking aim at a traditionally software-only market, VeriSign Inc this week introduced a hosted access control service, the fruit of a deal signed with IBM Corp back in January,

Kevin Murphy writes

The companies also expect to work together further on hosted provisioning services in the future, ComputerWire has learned.

The company is targeting a marketplace occupied by the likes of Netegrity Inc's SiteMinder and IBM's own Tivoli Access Manager, with the new Access Management Service, which is actually a hosted version of the Tivoli product with some VeriSign management features added on.

"It's very expensive to deploy these," John Weinschenk, VeriSign's VP of Enterprise Solutions, said of access control software packages available on the market today. "If you're a large enterprise, it's not a big deal, but small to medium sized business don't have enough know-how to do it."

The AMS service allows companies to define a set of authorization policies that are applied whenever an employee or partner tries to access a web-based application or resource. The system accepts token, password or PKI-based authentication, and can be integrated into VeriSign's other security services, such as PKI.

VeriSign's modus operandi has always been to offer security and infrastructure systems as hosted services, even when it is the only company doing so. The value proposition is usually that smaller companies can save on IT administrations costs and up-front license fees by outsourcing systems one seat at a time.

"The next logical piece would be getting into provisioning," VeriSign's Weinschenk told ComputerWire. He said IBM's recent acquisition of Access360 Corp means Tivoli Access Manager will be integrated with the provisioning technology in Access360, and that it is likely VeriSign will then offer its on a hosted basis.

Provisioning is a form of employee resource management aimed at vastly simplifying the issuing and revocation of access rights and digital credentials to employees as they join and leave the company. Software vendors such as Business Layers Inc and Waveset Technologies Inc are in this market.

A second part of the January deal between VeriSign and IBM called for a joint services offering from the companies, and this was delivered this week in the form of "Trusted e-business Integration Solution". The offering helps WebSphere MQ customers integrate their business applications using Tivoli Access Manager and VeriSign authentication services such as PKI for security.

© ComputerWire

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
USA opposes 'Schengen cloud' Eurocentric routing plan
All routes should transit America, apparently
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.