SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Authentication-As-A-Service Gains Steam
Improved security, scalability, operational flexibility, and even brand differentiation
are driving AaaS
Ericka Chickowski, Contributing Editor
Dark Reading October 17, 2011
Cost, complexity, and complacency have all contributed to the tremendous
rut that most organizations face when it comes to authenticating users
within both inward- and outward-facing applications. And as IT continues
to progress within the cloud model, the traditional means of authentication
are showing their age given the interconnectedness of applications and
services these days. That's why an increasing number of enterprises and
cloud providers are looking to authentication-as-a-service (AaaS) to
increase security and manage authentication more fluidly.
"The cost and complexity involved in deploying strong authentication
solutions in-house, combined with the elongated time to value, make a
managed or cloud service model very appealing," says Frank Villavicencio,
executive vice president for Identropy.
While AaaS offers up all the traditional SaaS benefits of scalability and
outsourced expertise, the drivers for AaaS go beyond the bottom line,
says Jim Reno, security architect and distinguished engineer for CA
Technologies.
"As the community of users for applications and data expands to include
customers and partners, and as cloud service use grows, AaaS gives
enterprises the ability to more easily manage the wider and more diverse
communities of users that are now a standard part of doing business,"
Reno says. "For example, users from partner organizations are more
effectively managed in a cloud service than brought into internal systems.
The service allows capacity to increase as needed, and allows
management of those users by designated administrators in the partner
organization. "
That's exactly the scenario that has lead the Department of Homeland
Security (DHS) to implement AaaS within 70 different applications. DHS
CIO Richard Spires this month updated Congress on the department's
progress in cloud deployments. He told the House Homeland Security
Subcommittee on Cybersecurity, Infrastructure Protection and Security
Technology that AaaS has helped bridge the gap of authentication for both
federal employees and contractors needing to tap into DHS applications.
Currently DHS authenticates 250,000 federal employees and contractors
using AaaS.
AaaS not only offers security and operational benefits, but it can also
provide a differentiating edge for sensitive customer-facing systems,
experts say.
"There also is an element of service differentiation and branding," says
Ray Wizbowski, vice president of strategic marketing for the Security
Business Unit at Gemalto. "Cloud-based applications want to be seen as a
secure service, and leveraging an authentication service allows their users
to experience the security with a branded token/app at every login."
This can be huge in verticals such as financial services and retail, where
perceived trust is critical.
"Authentication processes directly influence consumers' perception of
trust, especially in areas like online banking and retail," says Roman
Yudkin, CTO at Confident Technologies. "The authentication process is
often the aspect of security that is most visible to users.
As authentication methods change, AaaS also provides a smoother
upgrade path to keep up with the latest attack trends. Many on-premise
systems have suffered from obsolescence, but are too expensive and too
ingrained in the IT fabric to upgrade quickly. That changes when moving
to a services setup.
"Consumer sites like Google, which have introduced two-factor
authentication using SMS, are great examples of using the new cloud
platform to roll out huge capabilities nearly overnight. Google Apps
supported two-factor using SMS, and suddenly 100 million people have an
alternative to passwords," says Eric Olden, CEO of Symplified. "That's a
great example of the power of the cloud versus legacy strong
authentication like RSA."
But like any new deployment model, AaaS is not without its challenges.
One of the difficulties Olden sees customers face is believing that services
such as single sign-on (SSO) AaaS will offer an easy shortcut to securing
identities in the cloud. Not so, he says, explaining that all the
fundamentals stay the same.
"Too many people think SSO is the answer when, in reality, SSO is not
security -- it's convenience. Companies that have made the cloud a
central part of their IT infrastructure realize there are no shortcuts to
security and trust in the cloud," he says. "They understand that they need
a centralized identity and access management foundation for the cloud
that provides classic fundamentals. [They need] AAAA: strong
authentication, access control policy, auditing visibility, and administration
of provisioning. We see far too many people ask for a SSO solution when
instead they should be asking how to have a trusted cloud platform,
starting with authentication and access control and auditing."
As organizations move down the AaaS maturity scale and continue to
support cloud deployments, what they could find is that they need identity
and access management (IAM) delivered as a service, not just straight
authentication.
"As cloud computing evolves, a model of identity is required that does not
depend on a single centralized user store or administrative domain. This is
IAM-as-a-service, and it is a necessary step in the development of cloud
computing," Reno says. "Not just enterprises, but cloud service providers
will look to support users coming from other systems and being managed
in different ways. So we see a big future for both public and private IAM
service offerings."
Have a comment on this story? Please click "Add Your Comment" below. If
you'd like to contact Dark Reading's editors directly, send us a message.

Contenu connexe

Plus de Market Engel SAS

Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
Market Engel SAS
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Market Engel SAS
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux
Market Engel SAS
 
Gamers in holland
Gamers in hollandGamers in holland
Gamers in holland
Market Engel SAS
 
Gamers in france
Gamers in franceGamers in france
Gamers in france
Market Engel SAS
 
H2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_statsH2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_stats
Market Engel SAS
 
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
Market Engel SAS
 
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
Market Engel SAS
 
Frederic ENGEL_ System I.D. 5753
Frederic ENGEL_ System I.D. 5753Frederic ENGEL_ System I.D. 5753
Frederic ENGEL_ System I.D. 5753
Market Engel SAS
 

Plus de Market Engel SAS (20)

Internet of-things-world-preview-program
Internet of-things-world-preview-programInternet of-things-world-preview-program
Internet of-things-world-preview-program
 
Happy new year 2015 !
Happy new year 2015 !Happy new year 2015 !
Happy new year 2015 !
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
 
AuditMyApps_English
AuditMyApps_EnglishAuditMyApps_English
AuditMyApps_English
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014
 
Le baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZLe baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZ
 
Today's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyToday's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's survey
 
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux
 
Gamers in the UK
Gamers in the UKGamers in the UK
Gamers in the UK
 
Gamers in holland
Gamers in hollandGamers in holland
Gamers in holland
 
Gamers in france
Gamers in franceGamers in france
Gamers in france
 
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
 
H2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_statsH2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_stats
 
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
 
neccton, Questor whitepaper
neccton, Questor whitepaperneccton, Questor whitepaper
neccton, Questor whitepaper
 
neccton_Mentor white paper
neccton_Mentor white paperneccton_Mentor white paper
neccton_Mentor white paper
 
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
 
Frederic ENGEL_ System I.D. 5753
Frederic ENGEL_ System I.D. 5753Frederic ENGEL_ System I.D. 5753
Frederic ENGEL_ System I.D. 5753
 

Dernier

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Authentication as-a-service gains steam_security dark reading

  • 1. Authentication-As-A-Service Gains Steam Improved security, scalability, operational flexibility, and even brand differentiation are driving AaaS Ericka Chickowski, Contributing Editor Dark Reading October 17, 2011 Cost, complexity, and complacency have all contributed to the tremendous rut that most organizations face when it comes to authenticating users within both inward- and outward-facing applications. And as IT continues to progress within the cloud model, the traditional means of authentication are showing their age given the interconnectedness of applications and services these days. That's why an increasing number of enterprises and cloud providers are looking to authentication-as-a-service (AaaS) to increase security and manage authentication more fluidly. "The cost and complexity involved in deploying strong authentication solutions in-house, combined with the elongated time to value, make a managed or cloud service model very appealing," says Frank Villavicencio, executive vice president for Identropy. While AaaS offers up all the traditional SaaS benefits of scalability and outsourced expertise, the drivers for AaaS go beyond the bottom line, says Jim Reno, security architect and distinguished engineer for CA Technologies. "As the community of users for applications and data expands to include customers and partners, and as cloud service use grows, AaaS gives enterprises the ability to more easily manage the wider and more diverse communities of users that are now a standard part of doing business," Reno says. "For example, users from partner organizations are more effectively managed in a cloud service than brought into internal systems. The service allows capacity to increase as needed, and allows management of those users by designated administrators in the partner organization. " That's exactly the scenario that has lead the Department of Homeland Security (DHS) to implement AaaS within 70 different applications. DHS CIO Richard Spires this month updated Congress on the department's progress in cloud deployments. He told the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection and Security
  • 2. Technology that AaaS has helped bridge the gap of authentication for both federal employees and contractors needing to tap into DHS applications. Currently DHS authenticates 250,000 federal employees and contractors using AaaS. AaaS not only offers security and operational benefits, but it can also provide a differentiating edge for sensitive customer-facing systems, experts say. "There also is an element of service differentiation and branding," says Ray Wizbowski, vice president of strategic marketing for the Security Business Unit at Gemalto. "Cloud-based applications want to be seen as a secure service, and leveraging an authentication service allows their users to experience the security with a branded token/app at every login." This can be huge in verticals such as financial services and retail, where perceived trust is critical. "Authentication processes directly influence consumers' perception of trust, especially in areas like online banking and retail," says Roman Yudkin, CTO at Confident Technologies. "The authentication process is often the aspect of security that is most visible to users. As authentication methods change, AaaS also provides a smoother upgrade path to keep up with the latest attack trends. Many on-premise systems have suffered from obsolescence, but are too expensive and too ingrained in the IT fabric to upgrade quickly. That changes when moving to a services setup. "Consumer sites like Google, which have introduced two-factor authentication using SMS, are great examples of using the new cloud platform to roll out huge capabilities nearly overnight. Google Apps supported two-factor using SMS, and suddenly 100 million people have an alternative to passwords," says Eric Olden, CEO of Symplified. "That's a great example of the power of the cloud versus legacy strong authentication like RSA." But like any new deployment model, AaaS is not without its challenges. One of the difficulties Olden sees customers face is believing that services such as single sign-on (SSO) AaaS will offer an easy shortcut to securing identities in the cloud. Not so, he says, explaining that all the fundamentals stay the same. "Too many people think SSO is the answer when, in reality, SSO is not security -- it's convenience. Companies that have made the cloud a central part of their IT infrastructure realize there are no shortcuts to security and trust in the cloud," he says. "They understand that they need a centralized identity and access management foundation for the cloud that provides classic fundamentals. [They need] AAAA: strong
  • 3. authentication, access control policy, auditing visibility, and administration of provisioning. We see far too many people ask for a SSO solution when instead they should be asking how to have a trusted cloud platform, starting with authentication and access control and auditing." As organizations move down the AaaS maturity scale and continue to support cloud deployments, what they could find is that they need identity and access management (IAM) delivered as a service, not just straight authentication. "As cloud computing evolves, a model of identity is required that does not depend on a single centralized user store or administrative domain. This is IAM-as-a-service, and it is a necessary step in the development of cloud computing," Reno says. "Not just enterprises, but cloud service providers will look to support users coming from other systems and being managed in different ways. So we see a big future for both public and private IAM service offerings." Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.