Cloud Access Security

Subscribe to Cloud Access Security: eMailAlertsEmail Alerts
Get Cloud Access Security: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Cloud Access Security
Free webinar today: “Manage Identity and Access to All Your External SaaS Apps from Salesforce” with Pat Patterson of Salesforce.com. Monday, 6/25 at 1 Eastern. http://www.brighttalk.com/webcast/5573/48649 (Available on-demand afterwards).
Intel Cloud SSO is a pure cloud-based identity solution from three of the most trusted names in the industry—Intel, McAfee and Salesforce.com—that simplifies the cumbersome process of providing users with access to hundreds of SaaS apps. A single point of management, control, access &...
Join us for what will be a very informative webinar on Applying Strong Authentication and Data Loss Prevention to Collaborative File Sharing April 26th 2012 – Time: 10:00 AM PDT, 1:00 PM EDT > Register Now Employees love the convenience … Continue reading →
Intel is sponsoring two identity-related events the week of April 16: European Identity Conference: Apr. 17-20, Munich. Andy Thurai, Chief Architect of the Application Security and Identity Products Group, will co-present a session “Cloud Identity Services – Models and Chal...
Dave Kearns of KuppingerCole recently published a blog, “Identity – Of, By, In and For the Cloud” that highlights nine different permutations of how identity services, the cloud, and apps can be combined. “Apps can reside either in the datacenter … Continu...
Essentially that is what it is. Recently we announced our Force.com based Cloud SSO solution. What is unique about this is that we are the first (and as of now the ONLY) solution that will allow Force.com user identities to … Continue reading →
If your company is adopting a cloud-first strategy, you have to be wondering about how to manage all your user’s identities in the cloud. Intel has published a new Cloud Identity Buyer’s Guide to help you navigate complex issues like: … Continue reading →
    Traditional IAM solutions have not kept pace with cloud innovation and new approaches to identity and access management are gaining ground. Should you move your IAM infrastructure to the cloud? What is the role of related standards? These … Continue reading →
Watch this interview between Tom Field and Intel Application Security & Identity Products Group, Chief Architect Andy Thurai.  Andy talks about API management and the attendant issues including security, management, auditing, metering, monitoring and monetization. You’ll hear...
As we introduced Intel Cloud SSO Beta last week at RSA conference, Steve Coplan, Senior Analyst with the 451 Group Enterprise Security Practice wrote a report on Intel’s solution. Few highlights from the report: Intel’s cloud access broker strategy, predicated … Conti...
At the RSA conference 2012 this week, we’re excited to introduce a new cloud service “Intel Cloud SSO” for Enterprises to provide Identity and Access Management (IAM) for cloud applications from the cloud. The service runs on Salesforce’s Force.com platform … Continue reading ...
Moving applications to the Cloud puts many enterprises in an accustomed position, the technology and processes that their business depends on aren’t under their sole control, but rather a mix of responsibilities. The move to the Cloud is not a … Continue reading →
A Registered Investment Advisor (RIA) firm designed to provide financial services to high net worth individuals is using IAM technology to remain competitive and provide attractive services to both clients and Wealth Advisors. The firm also needed to establish business … Continue...
Platinum Group of Companies – a financial services customer wanted to bring Facebook like collaboration and took the route of becoming a Social Enterprise rolling out Salesforce Chatter for all its employees to begin with. Thom Vandenberg, the IT Project … Continue reading ...
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in...
Cloud-based solutions empower organizations to exploit leading-edge technology, reduce costs, and improve productivity. A prime example is using secure file sharing solutions like Box® (www.box.com) to enhance collaboration, both within the organization and between enterprises. Today, ...
Box, an online file sharing provider is expanding into the Enterprise market and has partnered with Intel to bring OTP based strong authentication, single sign-on (SSO), and user provisioning to it’s Enterprise users. Enterprise users get the convenience of not … Continue r...
Cloud-based solutions empower organizations to exploit leading-edge technology, reduce costs, and improve productivity. A prime example is using secure file sharing solutions like Box® (www.box.com) to enhance collaboration, both within the organization and between enterprises. Today, ...
For any technology, it’s important to understand what problems it’s meant to address. In the last post we looked at Cloud Security Anti-Patterns. An Anti-Pattern represents an ineffective or counterproductive practice. In moving to the Cloud several Anti-Patterns have emerged... Je...
For any technology, it’s important to understand what problems it’s meant to address. In the last post we looked at Cloud Security Anti-Patterns. An Anti-Pattern represents an ineffective or counterproductive practice. In moving to the Cloud several Anti-Patterns have emerg...
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in...
We’re happy to announce general availability of Intel Expressway Cloud Access 360 (ECA 360) 2.0 release. This new release adds a range of exciting new features designed to simplify and improve our customers ability to manage user’s access to popular … Continue reading...
Join us on 10/6 at 2pm Eastern Time for an exciting and informative webinar: Federal Cloud Security Initiatives Explained - Choosing the Right Standards and Technologies Mapping the alphabet soup of federal cloud security initiatives is a daunting task. Tim... Jeffrey Goldberg
Join us on 10/6 at 2pm Eastern Time for an exciting and informative webinar:   Federal Cloud Security Initiatives Explained – Choosing the Right Standards and Technologies   Mapping the alphabet soup of federal cloud security initiatives is a daunting … Continue r...
A long time information security friend with long experience in crypto products and projects, said to me recently, “I just started getting involved in identity stuff, and I felt like I was back in the 1990s crypto days, so many... Jeffrey Goldberg
A long time information security friend with long experience in crypto products and projects, said to me recently, “I just started getting involved in identity stuff, and I felt like I was back in the 1990s crypto days, so many … Continue reading →
Salesforce and Force.com applications share the same identity management infrastructure. This allows a user logged into Salesforce to access other applications deployed on Force.com platform without entering credentials again (aka Single sign-on). This works very well except it doesn't...
Salesforceand Force.com applications share the same identity management infrastructure. This allows a user logged into Salesforce to access other applications deployed on Force.com platform without entering credentials again (aka Single sign-on). This works very well except it doesn...
Join us this Thursday, July 28, 2011 at 1PM Pacific (replay will be available after initial broadcast) as Andras Cser, Principal Analyst, Forrester and Vikas Jain, Director of Product Management, Intel Cloud Identity & Security shed light on how account... Jeffrey Goldberg
Join us this Wednesday, July 27, 2011 at 10am Pacific (replay will be available after initial broadcast) as Eve Maler, Principal analyst at Forrester and Vikas Jain, Director of Product Management for Intel Cloud Identity and Security shed light on... Jeffrey Goldberg
Join us this Thursday, July 28, 2011 at 1PM Pacific (replay will be available after initial broadcast) as Andras Cser, Principal Analyst, Forrester and Vikas Jain, Director of Product Management, Intel Cloud Identity & Security shed light on how account … Continue reading ...
Join us this Wednesday, July 27, 2011 at 10am Pacific (replay will be available after initial broadcast) as Eve Maler, Principal analyst at Forrester and Vikas Jain, Director of Product Management for Intel Cloud Identity and Security shed light on … Continue reading →
Many pundits say that you must pick a Cloud Provider and trust them. I beg to differ. First off why should we trust the Cloud Provider? A Cloud Consumer wants to leverage the Cloud Provider’s capabilities for functionality and scale... Jeffrey Goldberg
Many pundits say that you must pick a Cloud Provider and trust them. I beg to differ. First off why should we trust the Cloud Provider? A Cloud Consumer wants to leverage the Cloud Provider’s capabilities for functionality and scale … Continue reading →
Intel Expressway Cloud Access 360 (ECA360) provides an OpenID - SAML bridge (or converter) that allows users to use OpenID providers such as Paypal to login into SAML enabled endpoints such as Salesforce and Google Apps.Watch the screencast in this... Vikas Jain
Intel Expressway Cloud Access 360 (ECA360) provides an OpenID – SAML bridge (or converter) that allows users to use OpenID providers such as Paypal to login into SAML enabled endpoints such as Salesforce and Google Apps. Watch the screencast in … Continue reading →
McAfee (Intel subsidiary) today announced the McAfee Cloud Security Platform that includes 2 modules from Intel - Intel Expressway Cloud Access 360 (ECA360) and Intel Expressway Service Gateway. Follow the data The platform helps build secure bridge to the cloud... Vikas Jain
Force10 Networks, the leader in high-performance data center networks has entered into an agreement with Intel to incorporate Intel Expressway Cloud Access 360 (ECA360) software into its top-of-rack (ToR) switching solutions to extend the functionality of its Open Automation Framework....
McAfee (Intel subsidiary) today announced the McAfee Cloud Security Platform that includes 2 modules from Intel – Intel Expressway Cloud Access 360 (ECA360) and Intel Expressway Service Gateway. Follow the data The platform helps build secure bridge to the cloud … Continue ...
Force10 Networks, the leader in high-performance data center networks has entered into an agreement with Intel to incorporate Intel Expressway Cloud Access 360 (ECA360) software into its top-of-rack (ToR) switching solutions to extend the functionality of its Open Automation Framework ...