SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Authentication-As-A-Service Gains Steam
Improved security, scalability, operational flexibility, and even brand differentiation
are driving AaaS
Ericka Chickowski, Contributing Editor
Dark Reading October 17, 2011
Cost, complexity, and complacency have all contributed to the tremendous
rut that most organizations face when it comes to authenticating users
within both inward- and outward-facing applications. And as IT continues
to progress within the cloud model, the traditional means of authentication
are showing their age given the interconnectedness of applications and
services these days. That's why an increasing number of enterprises and
cloud providers are looking to authentication-as-a-service (AaaS) to
increase security and manage authentication more fluidly.
"The cost and complexity involved in deploying strong authentication
solutions in-house, combined with the elongated time to value, make a
managed or cloud service model very appealing," says Frank Villavicencio,
executive vice president for Identropy.
While AaaS offers up all the traditional SaaS benefits of scalability and
outsourced expertise, the drivers for AaaS go beyond the bottom line,
says Jim Reno, security architect and distinguished engineer for CA
Technologies.
"As the community of users for applications and data expands to include
customers and partners, and as cloud service use grows, AaaS gives
enterprises the ability to more easily manage the wider and more diverse
communities of users that are now a standard part of doing business,"
Reno says. "For example, users from partner organizations are more
effectively managed in a cloud service than brought into internal systems.
The service allows capacity to increase as needed, and allows
management of those users by designated administrators in the partner
organization. "
That's exactly the scenario that has lead the Department of Homeland
Security (DHS) to implement AaaS within 70 different applications. DHS
CIO Richard Spires this month updated Congress on the department's
progress in cloud deployments. He told the House Homeland Security
Subcommittee on Cybersecurity, Infrastructure Protection and Security
Technology that AaaS has helped bridge the gap of authentication for both
federal employees and contractors needing to tap into DHS applications.
Currently DHS authenticates 250,000 federal employees and contractors
using AaaS.
AaaS not only offers security and operational benefits, but it can also
provide a differentiating edge for sensitive customer-facing systems,
experts say.
"There also is an element of service differentiation and branding," says
Ray Wizbowski, vice president of strategic marketing for the Security
Business Unit at Gemalto. "Cloud-based applications want to be seen as a
secure service, and leveraging an authentication service allows their users
to experience the security with a branded token/app at every login."
This can be huge in verticals such as financial services and retail, where
perceived trust is critical.
"Authentication processes directly influence consumers' perception of
trust, especially in areas like online banking and retail," says Roman
Yudkin, CTO at Confident Technologies. "The authentication process is
often the aspect of security that is most visible to users.
As authentication methods change, AaaS also provides a smoother
upgrade path to keep up with the latest attack trends. Many on-premise
systems have suffered from obsolescence, but are too expensive and too
ingrained in the IT fabric to upgrade quickly. That changes when moving
to a services setup.
"Consumer sites like Google, which have introduced two-factor
authentication using SMS, are great examples of using the new cloud
platform to roll out huge capabilities nearly overnight. Google Apps
supported two-factor using SMS, and suddenly 100 million people have an
alternative to passwords," says Eric Olden, CEO of Symplified. "That's a
great example of the power of the cloud versus legacy strong
authentication like RSA."
But like any new deployment model, AaaS is not without its challenges.
One of the difficulties Olden sees customers face is believing that services
such as single sign-on (SSO) AaaS will offer an easy shortcut to securing
identities in the cloud. Not so, he says, explaining that all the
fundamentals stay the same.
"Too many people think SSO is the answer when, in reality, SSO is not
security -- it's convenience. Companies that have made the cloud a
central part of their IT infrastructure realize there are no shortcuts to
security and trust in the cloud," he says. "They understand that they need
a centralized identity and access management foundation for the cloud
that provides classic fundamentals. [They need] AAAA: strong
authentication, access control policy, auditing visibility, and administration
of provisioning. We see far too many people ask for a SSO solution when
instead they should be asking how to have a trusted cloud platform,
starting with authentication and access control and auditing."
As organizations move down the AaaS maturity scale and continue to
support cloud deployments, what they could find is that they need identity
and access management (IAM) delivered as a service, not just straight
authentication.
"As cloud computing evolves, a model of identity is required that does not
depend on a single centralized user store or administrative domain. This is
IAM-as-a-service, and it is a necessary step in the development of cloud
computing," Reno says. "Not just enterprises, but cloud service providers
will look to support users coming from other systems and being managed
in different ways. So we see a big future for both public and private IAM
service offerings."
Have a comment on this story? Please click "Add Your Comment" below. If
you'd like to contact Dark Reading's editors directly, send us a message.

Mais conteúdo relacionado

Mais de Market Engel SAS

Internet of-things-world-preview-program
Internet of-things-world-preview-programInternet of-things-world-preview-program
Internet of-things-world-preview-programMarket Engel SAS
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014Market Engel SAS
 
Le baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZLe baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZMarket Engel SAS
 
Today's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyToday's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyMarket Engel SAS
 
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Market Engel SAS
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux Market Engel SAS
 
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...Market Engel SAS
 
H2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_statsH2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_statsMarket Engel SAS
 
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...Market Engel SAS
 
neccton, Questor whitepaper
neccton, Questor whitepaperneccton, Questor whitepaper
neccton, Questor whitepaperMarket Engel SAS
 
neccton_Mentor white paper
neccton_Mentor white paperneccton_Mentor white paper
neccton_Mentor white paperMarket Engel SAS
 
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...Market Engel SAS
 
Frederic ENGEL_ System I.D. 5753
Frederic ENGEL_ System I.D. 5753Frederic ENGEL_ System I.D. 5753
Frederic ENGEL_ System I.D. 5753Market Engel SAS
 

Mais de Market Engel SAS (20)

Internet of-things-world-preview-program
Internet of-things-world-preview-programInternet of-things-world-preview-program
Internet of-things-world-preview-program
 
Happy new year 2015 !
Happy new year 2015 !Happy new year 2015 !
Happy new year 2015 !
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
 
AuditMyApps_English
AuditMyApps_EnglishAuditMyApps_English
AuditMyApps_English
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014
 
Le baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZLe baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZ
 
Today's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyToday's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's survey
 
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux
 
Gamers in the UK
Gamers in the UKGamers in the UK
Gamers in the UK
 
Gamers in holland
Gamers in hollandGamers in holland
Gamers in holland
 
Gamers in france
Gamers in franceGamers in france
Gamers in france
 
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
 
H2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_statsH2 Gambling Capital_gaming-in-holland_stats
H2 Gambling Capital_gaming-in-holland_stats
 
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
La gestion des contenus d'entreprise selon www.walabiz.fr: le cas d'usage de ...
 
neccton, Questor whitepaper
neccton, Questor whitepaperneccton, Questor whitepaper
neccton, Questor whitepaper
 
neccton_Mentor white paper
neccton_Mentor white paperneccton_Mentor white paper
neccton_Mentor white paper
 
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation...
 
Frederic ENGEL_ System I.D. 5753
Frederic ENGEL_ System I.D. 5753Frederic ENGEL_ System I.D. 5753
Frederic ENGEL_ System I.D. 5753
 

Último

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 

Último (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

Authentication as-a-service gains steam_security dark reading

  • 1. Authentication-As-A-Service Gains Steam Improved security, scalability, operational flexibility, and even brand differentiation are driving AaaS Ericka Chickowski, Contributing Editor Dark Reading October 17, 2011 Cost, complexity, and complacency have all contributed to the tremendous rut that most organizations face when it comes to authenticating users within both inward- and outward-facing applications. And as IT continues to progress within the cloud model, the traditional means of authentication are showing their age given the interconnectedness of applications and services these days. That's why an increasing number of enterprises and cloud providers are looking to authentication-as-a-service (AaaS) to increase security and manage authentication more fluidly. "The cost and complexity involved in deploying strong authentication solutions in-house, combined with the elongated time to value, make a managed or cloud service model very appealing," says Frank Villavicencio, executive vice president for Identropy. While AaaS offers up all the traditional SaaS benefits of scalability and outsourced expertise, the drivers for AaaS go beyond the bottom line, says Jim Reno, security architect and distinguished engineer for CA Technologies. "As the community of users for applications and data expands to include customers and partners, and as cloud service use grows, AaaS gives enterprises the ability to more easily manage the wider and more diverse communities of users that are now a standard part of doing business," Reno says. "For example, users from partner organizations are more effectively managed in a cloud service than brought into internal systems. The service allows capacity to increase as needed, and allows management of those users by designated administrators in the partner organization. " That's exactly the scenario that has lead the Department of Homeland Security (DHS) to implement AaaS within 70 different applications. DHS CIO Richard Spires this month updated Congress on the department's progress in cloud deployments. He told the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection and Security
  • 2. Technology that AaaS has helped bridge the gap of authentication for both federal employees and contractors needing to tap into DHS applications. Currently DHS authenticates 250,000 federal employees and contractors using AaaS. AaaS not only offers security and operational benefits, but it can also provide a differentiating edge for sensitive customer-facing systems, experts say. "There also is an element of service differentiation and branding," says Ray Wizbowski, vice president of strategic marketing for the Security Business Unit at Gemalto. "Cloud-based applications want to be seen as a secure service, and leveraging an authentication service allows their users to experience the security with a branded token/app at every login." This can be huge in verticals such as financial services and retail, where perceived trust is critical. "Authentication processes directly influence consumers' perception of trust, especially in areas like online banking and retail," says Roman Yudkin, CTO at Confident Technologies. "The authentication process is often the aspect of security that is most visible to users. As authentication methods change, AaaS also provides a smoother upgrade path to keep up with the latest attack trends. Many on-premise systems have suffered from obsolescence, but are too expensive and too ingrained in the IT fabric to upgrade quickly. That changes when moving to a services setup. "Consumer sites like Google, which have introduced two-factor authentication using SMS, are great examples of using the new cloud platform to roll out huge capabilities nearly overnight. Google Apps supported two-factor using SMS, and suddenly 100 million people have an alternative to passwords," says Eric Olden, CEO of Symplified. "That's a great example of the power of the cloud versus legacy strong authentication like RSA." But like any new deployment model, AaaS is not without its challenges. One of the difficulties Olden sees customers face is believing that services such as single sign-on (SSO) AaaS will offer an easy shortcut to securing identities in the cloud. Not so, he says, explaining that all the fundamentals stay the same. "Too many people think SSO is the answer when, in reality, SSO is not security -- it's convenience. Companies that have made the cloud a central part of their IT infrastructure realize there are no shortcuts to security and trust in the cloud," he says. "They understand that they need a centralized identity and access management foundation for the cloud that provides classic fundamentals. [They need] AAAA: strong
  • 3. authentication, access control policy, auditing visibility, and administration of provisioning. We see far too many people ask for a SSO solution when instead they should be asking how to have a trusted cloud platform, starting with authentication and access control and auditing." As organizations move down the AaaS maturity scale and continue to support cloud deployments, what they could find is that they need identity and access management (IAM) delivered as a service, not just straight authentication. "As cloud computing evolves, a model of identity is required that does not depend on a single centralized user store or administrative domain. This is IAM-as-a-service, and it is a necessary step in the development of cloud computing," Reno says. "Not just enterprises, but cloud service providers will look to support users coming from other systems and being managed in different ways. So we see a big future for both public and private IAM service offerings." Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.