September 27, 2012
SEATTLE, Sept. 26 — The Cloud Security Alliance (CSA) announced that its Security as a Service (SecaaS) Working Group has completed its peer review process and has published implementation guidance documents expanding upon their “Defined Categories of Service" document that was first made available in August of 2011. The Working Group’s Implementation Guidance now includes peer-reviewed documentation for each of the ten service categories that were defined in the previous version.
“The cloud presents organizations with a whole new set of challenges when it comes to assuring proper identity controls and access to privileged resources,” said Patrick Harding, CTO of Ping Identity. “The SecaaS implementation guidance being led by the CSA will go a long way to providing critical definitions across the industry and we are proud to be a sponsor of this important research.”
The first category being released today is on Identity and Access Management (IAM), providing a comprehensive set of controls for assured identities and access management. The IAM category is being sponsored by Courion Corporation, a leader in identity and access management (IAM) for access risk, and Ping Identity, The Cloud Identity Security LeaderTM. The remaining guidance documents will be presented at the CSA Summit at RSA Europe in London on October 8 and can be downloaded for free at: https://cloudsecurityalliance.org/research/secaas/#_downloads
“There is a great deal of excitement around providing Security as a Service but organizations need to make sure that the solutions being provided follow strong security guidelines,” said Dave Fowler, chief operating officer at Courion Corporation. “CSA’s SecaaS Working Group has done an exceptional job of defining the key security categories and incorporating feedback from domain experts across the security spectrum for this expanded version of implementation guidance.”
About the Cloud Security Alliance
The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at http://www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Source: Cloud Security Alliance
10/30/2013 | Cray, DDN, Mellanox, NetApp, ScaleMP, Supermicro, Xyratex | Creating data is easy… the challenge is getting it to the right place to make use of it. This paper discusses fresh solutions that can directly increase I/O efficiency, and the applications of these solutions to current, and new technology infrastructures.
10/01/2013 | IBM | A new trend is developing in the HPC space that is also affecting enterprise computing productivity with the arrival of “ultra-dense” hyper-scale servers.
Ken Claffey, SVP and General Manager at Xyratex, presents ClusterStor at the Vendor Showdown at ISC13 in Leipzig, Germany.
Join HPCwire Editor Nicole Hemsoth and Dr. David Bader from Georgia Tech as they take center stage on opening night at Atlanta's first Big Data Kick Off Week, filmed in front of a live audience. Nicole and David look at the evolution of HPC, today's big data challenges, discuss real world solutions, and reveal their predictions. Exactly what does the future holds for HPC?