Monday 12 April 2010

Lock the Front Door for Cloud Computing Security

Enterprises continue to expand the use of cloud computing, and particularly software-as-a-service applications (SaaS), to achieve operational performance enhancements and efficiencies.

Implementation of these technologies introduces several challenges related to identity management, such as administration and delegation of account authentication and authorization. A new approach to identity is required to ensure the continued growth and success of cloud computing: we call this Identity 2.0. One of the most critical challenges is the need to accurately identify and manage users of these services. Yet at the same time, users are demanding greater control, convenience, and security.

The challenges faced by a greater emphasis on the cloud are ones of both centralization and de-centralization: the centralization of computing resources combined with the decentralization of identity, authentication and authorization. Identity 2.0's challenge is how to cope with these two competing forces while avoiding the pitfalls of the past. During this session, Fran Rosch will address whether Identity 2.0 is prepared for an explosion of cloud computing, or do we need some other model?

Join Us: http://bit.ly/joincloud

No comments: