Feeds

VeriSign and IBM Team for hosted access, provisioning

Based on Tivoli

  • alert
  • submit to reddit

Application security programs and practises

ComputerWire: IT Industry Intelligence

Taking aim at a traditionally software-only market, VeriSign Inc this week introduced a hosted access control service, the fruit of a deal signed with IBM Corp back in January,

Kevin Murphy writes

The companies also expect to work together further on hosted provisioning services in the future, ComputerWire has learned.

The company is targeting a marketplace occupied by the likes of Netegrity Inc's SiteMinder and IBM's own Tivoli Access Manager, with the new Access Management Service, which is actually a hosted version of the Tivoli product with some VeriSign management features added on.

"It's very expensive to deploy these," John Weinschenk, VeriSign's VP of Enterprise Solutions, said of access control software packages available on the market today. "If you're a large enterprise, it's not a big deal, but small to medium sized business don't have enough know-how to do it."

The AMS service allows companies to define a set of authorization policies that are applied whenever an employee or partner tries to access a web-based application or resource. The system accepts token, password or PKI-based authentication, and can be integrated into VeriSign's other security services, such as PKI.

VeriSign's modus operandi has always been to offer security and infrastructure systems as hosted services, even when it is the only company doing so. The value proposition is usually that smaller companies can save on IT administrations costs and up-front license fees by outsourcing systems one seat at a time.

"The next logical piece would be getting into provisioning," VeriSign's Weinschenk told ComputerWire. He said IBM's recent acquisition of Access360 Corp means Tivoli Access Manager will be integrated with the provisioning technology in Access360, and that it is likely VeriSign will then offer its on a hosted basis.

Provisioning is a form of employee resource management aimed at vastly simplifying the issuing and revocation of access rights and digital credentials to employees as they join and leave the company. Software vendors such as Business Layers Inc and Waveset Technologies Inc are in this market.

A second part of the January deal between VeriSign and IBM called for a joint services offering from the companies, and this was delivered this week in the form of "Trusted e-business Integration Solution". The offering helps WebSphere MQ customers integrate their business applications using Tivoli Access Manager and VeriSign authentication services such as PKI for security.

© ComputerWire

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.