This article originally appeared in the March issue of INTERNET TELEPHONY magazine.
In the movie Shrek, the title character says that ogre’s are like onions – in that they have layers. Turns out security and ogres have something in common.
All security has layers like an onion, says Jim Reno, security architect and distinguished engineer for CA (News - Alert) Technologies. There’s the security of the device through solutions such as anti-virus and anti-malware software; identity authentication to services like cloud applications; and security at the data center of the data itself, he says.
One of the layers of security that is getting a fair amount of attention these days, Reno adds, is application security as it relates to cloud computing. The rise of cloud computing means more data from individuals and organizations is “out there,” Reno notes, so there’s an obvious need to ensure the security of that data, while at the same time enabling the data to be accessed by authorized third parties.
For example, he says, a person who uses a cloud-based service for photo sharing might want to employ the service to both share pictures with select friends and family, and possibly even allow a photo printing business access to photos the person wants to have printed. That kind of access model, Reno continues, is a good match for the kind of content-aware security solutions provided by CA Technologies (News - Alert).
The company sells its security software via two models. Customer can run the software themselves, or CA Technologies can provide the security as a cloud service. The company offers a wide breadth of security solutions, including identity management (for authenticating users, managing users and their identities), federation services (applying identity so you can use it to access across multiple sites or providers), access management, and more.
Edited by Jennifer Russell