Sponsor

2012/04/26

Pros and cons of cloud-based Windows 8 authentication

April 26, 2012 Published by  SearchCloudSecurity.com

Cloud Security Briefing

SearchCloudSecurity.com
By Joseph Granneman, Contributor
Windows Password and Security Tips
Companies deploying cloud-based services have discovered how complicated authentication can be. Each cloud service requires a different username and password combination along with multiple types of secondary authentication options, including tokens and certificates. This complexity can create other security risks as users implement common workarounds such as Post-it Notes stuck to monitors and underneath keyboards. Security technologies have been evolving to provide simplified authentication methods for cloud services. Security Assertion Markup Language (SAML), OAuth and OpenID are some of the leading standards that provide single sign on capabilities for cloud-based applications.

Read more

Subscribe via RSS


Cloud IAM: Creating connectors for dynamic cloud provisioning of users
Most organizations have multiple identity stores and access management mechanisms that require user provisioning. Provisioning these users in the cloud, however, becomes another task the enterprise must wrestle with. One of the features many organizations will want to implement to support cloud service is dynamic user provisioning. This technical tip will help identify practical mechanisms by which an organization can implement such dynamic cloud provisioning.
Cloud computing access control: Access management services in the cloud


Cloud security vendors win funding for technologies
The rush to the cloud can often make security an afterthought, but if recent funding announcements are any indication, the VC community wants to reverse that trend. CloudPassage, Cloud Lock and Symplified are among the cloud security vendors winning funding this year.
Cloud contracts: Cloud computing pricing



ABOUT THIS E-NEWSLETTER
TechTarget This e-newsletter is published by SearchCloudSecurity.com, part of the TechTarget network. TechTarget provides IT professionals with the resources they need to perform their jobs: Web sites, newsletters, forums, blogs, white papers, webcasts, events and more.

Copyright 2012 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

We're sending you this information based on the Topics you selected in your TechTarget Member Profile. To unsubscribe, click here.

Unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Please note, this will not affect any other subscriptions you have signed up for.

Contact Us:
SearchCloudSecurity.com
Member Services
275 Grove Street
Newton, MA 02466
Contact: Webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy: PRIV LINK

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts