Feeds

RSA pushes single sign-on into the clouds

Just the one dear

7 Elements of Radically Simple OS Migration

RSA has launched a set of services designed to foster trust between business and cloud service providers.

Cloud Trust Authority from the security division of EMC is designed to tap into the growing market for cloud computing with a roster of technologies and services, the first of which is an Identity Service. Partially based on VMWare's virtualisation tech, the service will allow businesses to "secure user access and user provisioning to multiple cloud providers via federated single sign-on and directory synchronisation".

Single Sign-On offers the benefits of minimising password management headaches for firms. RSA has taken this idea and applied it to cloud services, such as email. Secure logins to these services will be facilitated via RSA SecurID technology in much the same way as the technology has long been applied to remote access.

A second service, Compliance Profiling Service, will allow businesses to benchmark whether cloud service providers are meeting industry best practice, as defined by industry organisations such as the Cloud Security Alliance.

The two services are collectively designed to give businesses greater confidence in running key enterprise services from the cloud, while giving service providers the opportunity to deliver applications that might otherwise be kept in-house due to either security or compliance concerns.

A beta of RSA Cloud Trust Authority, including both the Identity and Compliance services, will be available in the second half of 2011.

RSA's announcement of the services was one of a slew of announcements of cloud security products and services made at the RSA Conference in San Francisco this week.

For example, IBM launched an intrusion prevention appliance rated to work at 20Gbps. The GX7800 is aimed at cloud service providers as well as enterprises. Meanwhile, Symantec said it is making greater use of cloud-based reputation technology in Symantec Endpoint Protection 12, the latest edition of its security client for corporate desktops.

Using cloud-based community intelligence to whitelist known benign apps can reduce the performance overhead of anti-virus scanning by as much as 70 per cent, the security giant claims. ®

Best practices for enterprise data

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Microsoft says 'weird things' can happen during Windows Server 2003 migrations
Fix coming for bug that makes Kerberos croak when you run two domain controllers
Cisco says network virtualisation won't pay off everywhere
Another sign of strain in the Borg/VMware relationship?
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?