Advertisment

Verizon and Novell unveil cloud-based security soln

author-image
CIOL Bureau
Updated On
New Update

BANGALORE,INDIA:  Verizon and Novell Technology today announced new cloud-based solution aimed at giving enterprise clients the much-needed security to run their cloud-based applications.

Advertisment

According to a press release, the Secure Access Services from Verizon -- a new on-demand identity and access management service -- will make it easy and cost-effective for enterprise clients to outsource the infrastructure and expertise required to extend and manage user access to cloud-based resources while maintaining control over policies and governance.

With Secure Access Services from Verizon, enterprises can quickly tap into centralized management of Web access to applications and network services, identity federation and Web single sign-on -- without additional hardware or software, or dedicated IT resources. The service’s built-in audit features can also help clients ease the burden of compliance reporting related to the access of systems and data.

ALSO READ: SECURITY TRENDS 2010

Advertisment

“Cloud computing is core to Verizon's strategy,” said Kerry Bailey, senior vice president and chief marketing officer, Verizon Business. “By working with Novell as part of our overall cloud strategy,  we’re providing our clients with a more agile, cost effective and scalable way of securing the enterprise cloud environment so they can reap the full benefits of cloud computing.”

According to industry experts, adoption of cloud technologies is quickly gaining momentum, with about one-third of enterprises having some enterprise applications or business processes running in the cloud and an additional 16 percent planning to migrate applications or processes in the next 12 months. Security is the No. 1 cloud concern among IT professionals, with some experts cautioning without an adequate identity management and security framework, enterprises are putting themselves at real risk.

Many companies today rely on traditional premises-based identity and access management software for securing access to corporate applications. These deployments often involve complex integrations, lengthy deployments, extensive upfront software and hardware purchases, and significant ongoing operational and staffing costs.

tech-news