Digital security provider Gemalto is claiming an industry-first with the launch of a new solution that it says will enable organisations which have invested in Public Key Infrastructure (PKI) security applications to leverage their investment without compromise on security or user experience when moving to the cloud.
Gemalto says its new solution will enable employees and organisations to benefit from SSO and high assurance PKI-based authentication, making it easier and more secure to access cloud and web-based apps and resources from wherever and on any device.
And, additionally, Gemalto says the solution will help users access PKI applications from new environments, including mobile devices and virtualised desktops environments, and use PKI credentials for security applications including digital signing and email encryption.
Through SafeNet Trusted Access, Gemalto says security-sensitive organisations whose employees log into enterprise resources with smart cards can use those same credentials to access cloud and web-based apps and benefit from single sign on (SSO).
According to Gemalto, up until now, PKI hardware’s limitations meant companies could not adopt cloud and mobility projects without having to completely ‘rip and replace’ their current security framework.
“As a result, companies have been using smart cards and tokens to allow their employees to authenticate themselves while accessing corporate resources, but this was limited to activity within the enterprise perimeter. In addition, companies that use PKI credentials for email encryption and digital signing have also been limited to on-premises environments,” Gemalto says.
“As much as cloud computing is recognised for its many benefits, the reality for most firms is that they will be operating in a hybrid environment for years to come,” said Garrett Bekker, Principal Security Analyst at 451 Research.
“By enabling firms to extend their existing PKI investments to cloud and web-based resources, SafeNet Trusted Access can help firms build on their existing security frameworks to accelerate their digital and cloud transformation.”
Gemalto is offering different ways to build on current PKI investments, so companies embrace digital transformation without compromising on security, including:Enabling cloud transformation: Organisations can extend PKI credentials to access policies, allowing CISOs to maintain security in the cloud by triggering the use of step up PKI-based authentication to cloud and web-based apps when needed. Facilitating mobility: Employees can access enterprise applications within virtual environments with their PKI credentials. This means that employees and consultants will be able to perform all the same actions they would normally perform with a smart card, with a virtual smart card.
“With the rapid development and adoption of cloud services, many organisations are struggling to balance their digital transformation projects with the need to keep themselves secure,” said Francois Lasnier, senior vice president of Identity and Access Management at Gemalto.47 REASONS TO ATTEND YOW! 2018
With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.
Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll
be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!
Register now for YOW! Conference
Sydney 29-30 November
Brisbane 3-4 December
Melbourne 6-7 December
Register now for YOW! Workshops
Sydney 27-28 November
Melbourne 4-5 December
REGISTER NOW!LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK
Australia is a cyber espionage hot spot.
As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.
It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.
In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.
Cyber security can no longer be ignored, in this white paper you’ll learn:
How does business security get breached?
What can it cost to get it wrong?
6 actionable tips