|By Eric Z. Maass||
|May 9, 2012 05:00 AM EDT||
In today's business world, data is the lifeblood of most organizations. As such, it has become a prime target for both external and internal threats. Data breaches made plenty of headlines in 2011 and don't show any signs of slowing down. In fact, a recent report from Privacy Rights Clearinghouse found that there were 535 data breaches reported last year alone. Whether it is for a Fortune 500 business, a university or a midmarket company, the protection of sensitive information is not only important for daily business functions, but is now a security measure required by law. As organizations of all sizes - not just large enterprises - struggle to keep up with evolving security and compliance requirements, many are turning to identity and access management (IAM) solutions to meet their needs.
Unlike traditional IT security technologies, which focus on perimeter and end-point threats, IAM solutions focus on identity lifecycles and access controls, as well as provisioning, authentication, certification and other identity-based processes. Previously seen as a luxury only available to the largest of organizations, cloud computing has increased the accessibility of IAM solutions for businesses of all sizes at a time when they are needed most. In addition, cloud computing provides the opportunity for security vendors to bring mature IAM technology to smaller businesses via a new deployment model - without starting from scratch and losing years of successful development.
Bringing SaaS into the IAM Fold
Originally hesitant to put sensitive data in the cloud, many companies are beginning to realize that cloud services can often be more secure than in-house data centers, as they are held to service level agreements (SLAs) and other third-party regulations. As such, more organizations are now readily adopting Software-as-a-Service (SaaS) and cloud solutions to maximize efficiencies, lower total cost of ownership and ultimately "do more with less." How? Cloud-based IAM solutions can be deployed at a fraction of the time and cost of on-premise infrastructure. In addition, because cloud-based solutions are often much easier to use and manage, IT managers can focus on tasks that are more central to business goals rather than spending their resources trying to manage complex on-premise infrastructure.
For many organizations, the strategy for growth over the next couple of years will be heavily focused on expanding and optimizing their extranet community - SaaS providers, cloud service providers, supply chain partners, resellers, integrators and other business partners. The question now becomes how to secure these SaaS-based applications, cloud services and other third-party systems. Having a strategy for external audiences' identities and entitlements - in addition to internal employees - as well as visibility into all identity data is critical to a business's future success. Enter federation.
Federation, which enables companies to extend IAM capabilities to third-party applications and securely share identity information with external audiences, is becoming an increasingly strategic business tool. Two of the most common federated IAM capabilities are Federated Single Sign-On (FSSO) and federated user provisioning.
- Federated Single Sign-On (FSSO): FSSO capabilities allow a company's user base to access applications while avoiding the need to transmit shared secrets, such as passwords, to third parties - mitigating the risk of important credentials being compromised. FSSO also allows the user to log in to all applications in a uniform way regardless of whether they are housed internally or hosted by an external partner. The flip side of this capability is that the business can also safely provide authorized third parties with access to their applications. Using an industry-proven means of providing SSO capabilities to third parties - rather than using an in-house grown solution that hasn't been vetted or tested - can help companies strengthen security and increase compliance while improving productivity by eliminating password reset requests and other associated help desk calls.
- Federated User Provisioning: Federated user provisioning allows third-party applications to be included in the same identity and lifecycle process as internal applications. With the use of secure and open-standard protocols, organizations can seamlessly exchange identity data with partners and SaaS providers as well as provision users, roles and entitlements to external applications. Equally as important, using federated user provisioning, companies can also ensure that user role and entitlement information found on third-party systems is timely and accurate, mitigating the risk of important data being accessed by unauthorized users.
At the onset of widespread SaaS adoption, many companies did not consider external applications part of their network infrastructure - and so provisioning and other IAM capabilities were focused on on-premise systems only. As more and more critical data and applications become housed in the cloud, eschewing security liability for systems and information residing outside a company's four walls is a critical and common mistake.
Provisioning encompasses managing role data and access rights throughout a user's life cycle - from onboarding, transfers and promotions to the day they leave the company - and must be applied to both on- and off-premise systems in a timely and accurate manner in order to ensure proper access to important data. Otherwise, companies open themselves up to a variety of dangers, including data breaches, increased IT costs and compliance risks.
For example, effectively deprovisioning a user when they are no longer authorized to access certain resources is just as important as giving them access at the start of an identity life cycle. Failure to deprovision users who have left a company can result in orphan accounts, opening the organization up to a number of potential issues. Compliance requirements aside, ex-employees who still have access to SaaS or on-premise applications can potentially harvest corporate and client information for nefarious purposes. In other cases, it's important to have up-to-date entitlement information when users simply change position or are given different responsibilities. Otherwise, these events can lead to "entitlement sprawl" wherein users accumulate privileges that are no longer necessary for their jobs. In the age of the data breach, IAM solutions are more than just another add-on for a business's security infrastructure. An effective IAM solution will protect sensitive data, help to avoid complications in daily business operations, minimize potential legal woes and ensure a strong reputation among customers.
As technologies, such as mobile devices and social networking sites, continue to further convolute the security landscape, more and more critical assets are being placed outside a company's four walls. In order to put their security measures closer to these assets, many companies are implementing cloud-based solutions. Proficient cloud-based IAM tools can help companies strengthen security and increase compliance while benefiting from unparalleled savings, quick time-to-deployment and greater business efficiencies - a win-win for all involved.
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jun. 28, 2016 07:30 PM EDT Reads: 378
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effi...
Jun. 28, 2016 07:15 PM EDT Reads: 305
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Jun. 28, 2016 06:30 PM EDT Reads: 305
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Jun. 28, 2016 04:30 PM EDT Reads: 897
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Jun. 28, 2016 02:00 PM EDT Reads: 1,137
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Jun. 28, 2016 01:00 PM EDT Reads: 823
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jun. 28, 2016 12:45 PM EDT Reads: 959
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
Jun. 28, 2016 12:00 PM EDT Reads: 1,159
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Jun. 28, 2016 10:30 AM EDT Reads: 506
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...
Jun. 28, 2016 10:00 AM EDT Reads: 456
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
Jun. 28, 2016 10:00 AM EDT Reads: 408
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
Jun. 28, 2016 09:45 AM EDT Reads: 451
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change t...
Jun. 28, 2016 09:30 AM EDT Reads: 1,301
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Jun. 28, 2016 08:30 AM EDT Reads: 1,230
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
Jun. 28, 2016 08:00 AM EDT Reads: 482
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Jun. 28, 2016 08:00 AM EDT Reads: 1,353
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Jun. 26, 2016 05:00 PM EDT Reads: 1,355
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Jun. 26, 2016 05:00 PM EDT Reads: 1,264
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Jun. 26, 2016 04:00 PM EDT Reads: 1,314
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Jun. 26, 2016 04:00 PM EDT Reads: 1,398