June 26, 2012
Identity experts convene to examine trends and opportunities for strong authentication and identity as a service
DENVER, June 26 — Ping Identity, The Cloud Identity Security Leader, today announced details of the Cloud Security Alliance (CSA) track for this year's Cloud Identity Summit, taking place July 16-20 at Vail, Colorado's Cascade Resort. The 2012 Cloud Identity Summit explores the role of identity as the new perimeter and examines ways cloud computing, mobile device access and social networking are transforming business and IT.
With more than 36,000 members, the CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within cloud computing, and to provide education on the uses of cloud computing to help secure all other forms of computing.
The Cloud Security Alliance track, which begins at 1:30 p.m. MT on Wednesday, July 18, includes the following sessions:
Overview of Domain 12 Guidance on Identity Management
(Identity, Entitlements and Access)
Ulrich Lang, CEO, ObjectSecurity
Identity, authorization, and access management includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, then granting the correct level of access based on this assured identity. The concepts behind identity, entitlement, and access management used in traditional computing require fundamental changes in thinking when implementing a cloud environment. Domain 12 of the CSA Guidance for cloud computing addresses these issues by establishing three discrete functions: Identity, Entitlement, and Authorization/Access Management (IdEA).
CSA Identity Roadmap: SecaaS IAM & Future Directions
Ulrich Lang, CEO, ObjectSecurity
This session will provide an overview of CSA's current efforts to fit identity, authorization, and access management into the broader context of security as a service (SecaaS).This session presents the draft CSA SecaaS IAM guidance, which discusses what needs to be considered by an organization seeking to implement the IAM component of SecaaS as part of the cloud environment, or an organization that is looking for guidance as to how to assess an IAM SecaaS offering. The session is intended to assist with the planning, design, implementation and assessment of SecaaS offerings.
Issues and Opportunities with Strong Authentication
Phil Dunkelberger, CEO, LNR Consulting
This session will feature discussion of the widely-acknowledged problems with using account names and passwords to authenticate online. The nature of the breakdown of historical strong authentication will be reviewed, along with key obstacles faced in scaling prior attempted solutions. The interplay of existing systems, ongoing standards-based approaches, and new initiatives will be reviewed, with focus on the key characteristics required for any proposed solution to work at internet/cloud scale.
Panel: Issues and Opportunities with Identity-as-a-Service (IDaaS)
CSA Special Master Bill Corrington will lead a peer discussion on the state of Identity as a service, with a focus on identity security issues and opportunities.
Sponsors of the Cloud Identity Summit include KPMG LLP (Platinum Show Sponsor) Google (Gold Workshop Sponsor), SailPoint (Silver Sponsor), Radiant Logic, Inc. (Emerald Sponsor), Covisint (Diamond Sponsor), Axiomatics & Advancive (Solution Sponsor), Courion (Solution Sponsor), CSC (Solution Sponsor),IBM (Solution Sponsor), Identropy (Solution Sponsor) Innotribe (Solution Sponsor),Layer 7(Solution Sponsor), Oracle (Solution Sponsor), Password Bank (Solution Sponsor), Symplified (Solution Sponsor), Ultimate Software (Solution Sponsor), Vordel (OIDF and OIX Summit Sponsor), Gluu (Lunch Sponsor) and Ping Identity.
About Cloud Identity Summit
Ping Identity's Cloud Identity Summit is the premiere conference dedicated to the role of identity in cloud security. With 15 expert led, hands-on educational workshops and over 30 industry speakers, the Cloud Identity Summit brings together hundreds of the world's top experts, implementers and vendors into a single week of knowledge sharing.
About Ping Identity | The Cloud Identity Security Leader
Ping Identity provides cloud identity security solutions to more than 800 of the world's largest companies, government organizations and cloud businesses. With a 99% customer satisfaction rating, Ping Identity empowers more than 42 of the Fortune 100 to secure hundreds of millions of employees, customers, consumers and partners using secure, open standards like SAML, OpenID and OAuth. Businesses that depend on the Cloud rely on Ping Identity to deliver simple, proven and secure cloud identity management through single sign-on, federated identity management, mobile identity security, API security, social media integration, and centralized access control. Visit pingidentity.com for more information.
Source: Ping Identity
Frank Ding, engineering analysis & technical computing manager at Simpson Strong-Tie, discussed the advantages of utilizing the cloud for occasional scientific computing, identified the obstacles to doing so, and proposed workarounds to some of those obstacles.
The private industry least likely to adopt public cloud services for data storage are financial institutions. Holding the most sensitive and heavily-regulated of data types, personal financial information, banks and similar institutions are mostly moving towards private cloud services – and doing so at great cost.
In this week's hand-picked assortment, researchers explore the path to more energy-efficient cloud datacenters, investigate new frameworks and runtime environments that are compatible with Windows Azure, and design a uniﬁed programming model for diverse data-intensive cloud computing paradigms.
May 16, 2013 |
When it comes to cloud, long distances mean unacceptably high latencies. Researchers from the University of Bonn in Germany examined those latency issues of doing CFD modeling in the cloud by utilizing a common CFD and its utilization in HPC instance types including both CPU and GPU cores of Amazon EC2.
May 10, 2013 |
Australian visual effects company, Animal Logic, is considering a move to the public cloud.
May 10, 2013 |
Program provides cash awards up to $10,000 for the best open-source end-user applications deployed on 100G network.
May 08, 2013 |
For engineers looking to leverage high-performance computing, the accessibility of a cloud-based approach is a powerful draw, but there are costs that may not be readily apparent.
05/10/2013 | Cleversafe, Cray, DDN, NetApp, & Panasas | From Wall Street to Hollywood, drug discovery to homeland security, companies and organizations of all sizes and stripes are coming face to face with the challenges – and opportunities – afforded by Big Data. Before anyone can utilize these extraordinary data repositories, however, they must first harness and manage their data stores, and do so utilizing technologies that underscore affordability, security, and scalability.
04/02/2012 | AMD | Developers today are just beginning to explore the potential of heterogeneous computing, but the potential for this new paradigm is huge. This brief article reviews how the technology might impact a range of application development areas, including client experiences and cloud-based data management. As platforms like OpenCL continue to evolve, the benefits of heterogeneous computing will become even more accessible. Use this quick article to jump-start your own thinking on heterogeneous computing.