Cloud Infrastructure

08:15 AM
Connect Directly
RSS
E-Mail
50%
50%

Unified Security Management Is A Must-Have When Securing Private And Hybrid Clouds

While the cloud makes many things simpler for the end user, it increases complexity for the administrator, especially in the case of security. Centrify is looking to unify security management and provide the tools needed for compliance support, secure access and auditing via its latest iteration of Centrify Suite products and modules.

While the cloud makes many things simpler for the end user, it increases complexity for the administrator, especially in the case of security. Add in compliance requirements, such as HIPPA, PCI and SOX, and you now have a cloud service that is not only easy to use but can easily violate security requirements, resulting in fines or, worse yet, the loss of intellectual property and the liability that goes along with it.

Some administrators turn to firewalls and layered security, as well as encryption, to protect cloud-accessible digital assets, but real security lies with being able to control the who, what, when and where of access--and that requires a unified security management approach that coordinates user access with policies and security controls across IT assets. This is something that is becoming increasingly difficult with each business process and cloud application having its own access and user security systems. Security vendor Centrify is looking to unify security management and provide the tools needed for compliance support, secure access and auditing via its latest iteration of Centrify Suite products and modules.

Centrify is available in four different suites, with the Platinum suite offering the most features. In a nutshell, Centrify offers centralized management and administration of user accounts, centralized authentication (single sign-on), roles-based privilege management, detailed auditing (and playback) of user activity and trust-based protection of sensitive systems. Simply put, the product unifies user access and security under one umbrella, using account synchronization and policy controls to maintain that security.

For organizations maintaining the security of several distributed systems, Centrify takes the pain out of user management by federating user account control into a comprehensive, single-directory structure, which makes it much easier to control access, regardless of the system, service, location, end point and user.

Integrated auditing and forensics plays a critical role in maintaining compliance, while providing administrators with the ability to effectively protect applications and data. These are key capabilities that are needed to simplify cloud-based systems, especially hybrid and private clouds. Centrify is currently available, and more information can be found at http://www.centrify.com/products/centrify-suite-editions.asp.

See more on this topic by subscribing to Network Computing Pro Reports Strategy: Cloud Security Monitoring (subscription required).

Comment  | 
Print  | 
More Insights
Hot Topics
11
Fall IT Events: On The Road Again With 10 Top Picks
James M. Connolly, Editor in Chief, The Enterprise Cloud Site,  7/29/2014
3
25 GbE: A Big Deal That Will Arrive
Greg Ferro, Network Architect & Blogger,  7/29/2014
3
Cisco Ships APIC Controller, Reveals ACI Pricing
Marcia Savage, Managing Editor, Network Computing,  7/29/2014
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
2014 Private Cloud Survey
2014 Private Cloud Survey
Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ­extend their clouds across multiple datacenters. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.
Video
Slideshows
Twitter Feed