Regain Control of Your Perimeter in the Cloud
Facebook Twitter LinkedIn

Regain Control of Your Perimeter in the Cloud

Combined Session
Wednesday, May 05, 2010 16:30—17:30
Location: Antares

Regain Control of Your Perimeter in the Cloud

The traditional concept of an in-house data center behind a static corporate firewall is history once and for all. The enterprise is now in full embrace of dynamic applications provided and scaled by dedicated cloud service providers. To innovate faster, regain control, and compete in a new world that is shifting from a "need to know" to "need to share" paradigm requires a new focus on security and authorization in a dynamic perimeter. This dynamic perimeter spans hybrid models that seamlessly mix local applications and cloud services. This is irrelevant to the end user – they need SSO and AuthZ based on their need to share regardless of where the app is delivered. Administrators shouldn’t be forced to duplicate ids in the cloud – they want to maintain authoritative ids and policies from centralized decision points. And service providers do not have the expertise or desire to manage security. Service Gateways when combined with ABAC Attribute-based Access Control engines deliver a ready on-premise or cloud outsourced service to regain control of security within the virtualized data center.

Blake Dournaee
Blake Dournaee
Intel
Blake is currently the product manager responsible for Intel SOA products. As a product manager at Sarvega, he was deeply involved in the development of their flagship XML security, routing and...
Dr. Babak Sadighi
Dr. Babak Sadighi
Axiomatics AB
Babak Sadighi has a PhD in Computer Science from Department of Computing, Imperial College, London. He was  until august 2008, a researcher at the Swedish Institute of Computer Science and the...

Claims Based Identity and the Cloud

One of the many advantages of claims-based architectures is that they abstract away the details of their components, including where things are hosted. As long as services and identity providers are network-addressable, they can live on-premises and in the cloud and easily move between the two environment without changing the emerging properties of the system. The immediate advantage is that existing identity providers, typically on-premises, are readily available for the new applications in the cloud; on the long term, claims-based identity is a key enabler for incorporating the choice of deploying to the cloud in your current arsenal of IT tools. With claims-based identity, the cloud requires no special arrangements: things can fluidly move from distributed to centralized, following your own requirements and management style.

Vittorio Bertocci
Vittorio Bertocci
Microsoft
Vittorio Bertocci is an Architect Evangelist in the service of Windows Server Evangelism for Microsoft. He is based in Redmond, Washington. He works with Fortune 100 and major G100 enterprises...
Subscribe for updates
Please provide your email address