Q12: What tools do you offer to establish, maintain, and protect identity in the cloud? We use a variety of tools and techniques to support identity in the cloud. We also focus on privacy, including Electronic Protected Health Information (ePHI) and personally identifiable information (PII). These tools are embedded in our solution and delivered as a service to our customers. Cisco provides a number of cloud security solutions to protect data and identity in the cloud. One specific example is the Cisco Secure Cloud Access solution. With this solution, Cisco cloud security provides a critical SaaS revocation capability that establishes user identity and enables secure access to cloud-based SaaS applications. The Cisco SaaS revocation capability is delivered by the Cisco IronPort S-Series web security appliances to provide scalable access control to SaaS applications. When this capability is enabled, no direct access to SaaS applications is permitted. Instead, SaaS users are authenticated at a central place within the SaaS cloud subscriber organization. After successful authentication, security assertion markup language (SAML) is used to authorize access to SAML-enabled SaaS applications. Citrix works with the leading identity providers in the Citrix Ready program to provide for identity management. Citrix is a thought leader in the bring-your-own-identity (BYOI) space, helping combine personal identity and corporate identities to facilitate access to multiorganizational applications and data. Today these tools are specific to customer implementation, based on the technology deployed in their environment. Expedient helps to protect our clients’ identities more through process and governance than through a tool set. This is an area where we don’t publish specific details because doing so would help provide parties with ill intent with a roadmap to discover the information we are tasked with protecting. With HyTrust Appliance in place, there are no anonymous changes to the virtual infrastructure. All administrative access must first be authenticated. HyTrust can leverage any preexisting investment in LDAP or Microsoft* Active Directory.* For even tighter security, HyTrust fully supports two-factor authentication with RSA SecurID or smart cards. In the event that root access is required, HyTrust Appliance features root password vaulting, which enables certain administrators to check out a temporary password for one-time access. All access to the environment can be tied back to a specific individual—a critical requirement in security and compliance-conscious data centers. 38 Intel IT Center Vendor Round Table | Cloud Security
Cloud Security Vendor Round Table - Page 0001.html
Cloud Security Vendor Round Table - Page 0002.html
Cloud Security Vendor Round Table - Page 0003.html
Cloud Security Vendor Round Table - Page 0004.html
Cloud Security Vendor Round Table - Page 0005.html
Cloud Security Vendor Round Table - Page 0006.html
Cloud Security Vendor Round Table - Page 0007.html
Cloud Security Vendor Round Table - Page 0008.html
Cloud Security Vendor Round Table - Page 0009.html
Cloud Security Vendor Round Table - Page 0010.html
Cloud Security Vendor Round Table - Page 0011.html
Cloud Security Vendor Round Table - Page 0012.html
Cloud Security Vendor Round Table - Page 0013.html
Cloud Security Vendor Round Table - Page 0014.html
Cloud Security Vendor Round Table - Page 0015.html
Cloud Security Vendor Round Table - Page 0016.html
Cloud Security Vendor Round Table - Page 0017.html
Cloud Security Vendor Round Table - Page 0018.html
Cloud Security Vendor Round Table - Page 0019.html
Cloud Security Vendor Round Table - Page 0020.html
Cloud Security Vendor Round Table - Page 0021.html
Cloud Security Vendor Round Table - Page 0022.html
Cloud Security Vendor Round Table - Page 0023.html
Cloud Security Vendor Round Table - Page 0024.html
Cloud Security Vendor Round Table - Page 0025.html
Cloud Security Vendor Round Table - Page 0026.html
Cloud Security Vendor Round Table - Page 0027.html
Cloud Security Vendor Round Table - Page 0028.html
Cloud Security Vendor Round Table - Page 0029.html
Cloud Security Vendor Round Table - Page 0030.html
Cloud Security Vendor Round Table - Page 0031.html
Cloud Security Vendor Round Table - Page 0032.html
Cloud Security Vendor Round Table - Page 0033.html
Cloud Security Vendor Round Table - Page 0034.html
Cloud Security Vendor Round Table - Page 0035.html
Cloud Security Vendor Round Table - Page 0036.html
Cloud Security Vendor Round Table - Page 0037.html
Cloud Security Vendor Round Table - Page 0038.html
Cloud Security Vendor Round Table - Page 0039.html
Cloud Security Vendor Round Table - Page 0040.html
Cloud Security Vendor Round Table - Page 0041.html
Cloud Security Vendor Round Table - Page 0042.html
Cloud Security Vendor Round Table - Page 0043.html
Cloud Security Vendor Round Table - Page 0044.html

A javascript error just appeared or you do not have installed a Flash Player plugin in your browser.

Prestimedia, your interactive publications solution provider, invites you to download the latest Adobe Flash plugin by clicking here

This e.print interactive catalogue is made by Prestimedia