Feeds

RSA pushes single sign-on into the clouds

Just the one dear

Secure remote control for conventional and virtual desktops

RSA has launched a set of services designed to foster trust between business and cloud service providers.

Cloud Trust Authority from the security division of EMC is designed to tap into the growing market for cloud computing with a roster of technologies and services, the first of which is an Identity Service. Partially based on VMWare's virtualisation tech, the service will allow businesses to "secure user access and user provisioning to multiple cloud providers via federated single sign-on and directory synchronisation".

Single Sign-On offers the benefits of minimising password management headaches for firms. RSA has taken this idea and applied it to cloud services, such as email. Secure logins to these services will be facilitated via RSA SecurID technology in much the same way as the technology has long been applied to remote access.

A second service, Compliance Profiling Service, will allow businesses to benchmark whether cloud service providers are meeting industry best practice, as defined by industry organisations such as the Cloud Security Alliance.

The two services are collectively designed to give businesses greater confidence in running key enterprise services from the cloud, while giving service providers the opportunity to deliver applications that might otherwise be kept in-house due to either security or compliance concerns.

A beta of RSA Cloud Trust Authority, including both the Identity and Compliance services, will be available in the second half of 2011.

RSA's announcement of the services was one of a slew of announcements of cloud security products and services made at the RSA Conference in San Francisco this week.

For example, IBM launched an intrusion prevention appliance rated to work at 20Gbps. The GX7800 is aimed at cloud service providers as well as enterprises. Meanwhile, Symantec said it is making greater use of cloud-based reputation technology in Symantec Endpoint Protection 12, the latest edition of its security client for corporate desktops.

Using cloud-based community intelligence to whitelist known benign apps can reduce the performance overhead of anti-virus scanning by as much as 70 per cent, the security giant claims. ®

Internet Security Threat Report 2014

More from The Register

next story
Cray-cray Met Office spaffs £97m on VERY AVERAGE HPC box
Only 250th most powerful in the world? Bring back Michael Fish
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
Cisco and friends chase WiFi's searing speeds with new cable standard
Cat 5e and Cat 6 are bottlenecks for WLAN access points
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.