Sniper Cloud security CA Technologies launch IAM solution

Source: Internet
Author: User
Cloud computing has become a trend in the IT field, but as more security vulnerabilities are exposed, the future of cloud computing is fraught with anxiety and unease. Cloud computing services have freed companies from the shackles of hardware and software and infrastructure, and more and more companies are choosing to work online and store data online, and they have to face the grim fact that cyber attacks will also be centered on cloud computing within the next five years. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' style= ' Cursor:pointer ' Id=ewebeditor_tempelement_ IMG onclick= "showimg (THIS.SRC); return false;" border=0 Alt=ca Cloud Computing Security src= "http://images.51cto.com/files/uploadimg/ 20100903/2140030.gif ">ca Technologies2010 China Beijing Security Solutions Day General Meeting August 30, 2010, at CA Technologies2010 China Beijing Security Solution Day Conference, Veteran software management vendors have unveiled their identity authentication and access Management (IAM) solutions and shared practice cases. CA Technologies Security and Compliance Division director Matthew GARDINER,CA Technologies Greater China Vice President Zhou Haoliang, CA Technologies, the Security division of Greater China, Wang Fei, and CCB Xinjiang Branch senior architect Ma Changchang, respectively, made a keynote address. Cloud computing has become a new hotbed of data loss, and the rise of the cloud has put higher demands on corporate security. In a keynote address called "How to secure the enterprise in the cloud," Matthew Gardiner to come straight to the point: "In it day-to-day security management, identity and access management is one of the most important two points, only the two points to do, the enterprise can really take advantage of the cloud." "Matthew from the Nature of cloud computing, he cites Bun's definition of cloud computing:" Cloud computing is the ability to package a range of disciplines, technologies, and business models so that it can become an on demand, scalable, and resilient service. "As we all know, cloud services are tempting enough to bring the cost benefits to businesses, and in order to prove that, Matthew cites examples of Ford Motors." "Hundreds of years ago, cars were built by hand, and high costs made it possible for only a handful of wealthy people to afford a car," he said. As Ford's manufacturing process matures, it slowlySlowly changing from manufacturer to integrator, with the focus on automotive design, and parts sourcing from other vendors, a change that has made the standardization of cars, and reduced costs, pushed cars to more public sectors. And those who insist that the rich man-made cars are not to the new model of transformation and the market eliminated. "Similarly, cloud computing is also a change, enterprises do not need to build and maintain IT systems, can be directly purchased from the cloud, the use of hardware, software, operating system, and so on." However, each application is not perfect, and its application will inevitably lead to other problems. At the meeting, Matthew released Burton's research data on enterprise cloud computing security. Facing the grim situation of cloud security, how to prevent enterprises? "Cloud computing is a common service, so its security issues must be shared by cloud providers and users," Matthew said. He stressed that, like a tango, a partner in unison can show a graceful dance, and guard against cloud security issues, which requires the joint efforts of suppliers, cloud users and cloud watchdog organizations. Finally, he made the following recommendations to users: first, the application of low sensitivity to the cloud, resulting in cloud application model. Refuse to accept opaque security solutions from cloud vendors. Efforts to promote the adoption of safety standards. Do not go alone and join a number of relevant organizations and standards bodies. Click to download the white paper Subsequently, Zhou Haoliang introduced the CA Technologies market performance, Wang Fei's identity authentication and access Management (IAM) of the architecture of the analysis, Ma Changchang share the user's feelings. To improve the security of cloud computing applications, it is not enough to rely on the efforts of the user side, as cloud providers also hold user data. Only the cloud market in the industry chain of each participant to action to enhance the use of security, the cloud can have a broader tomorrow. "Editorial Recommendation" Identity authentication and access management not only provide security incident response mechanism: Combined SIM system and IAM system "responsible editor: Xu Fengli TEL: (010) 68476606" Original: Sniper Cloud security CA Technologies launch IAM solution Back to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.