sponsored by Intel
Posted:  19 May 2011
Published:  19 May 2011
Format:  PDF
Length:  13  Page(s)
Type:  Presentation Transcript
Language:  English
ABSTRACT:

Today, security for the cloud involves simplistic SSO scenarios from tightly controlled corporate applications. However, users are demanding access to the cloud from a wider range of clients and directly through the cloud platform itself. From a compliance standpoint its a growing nightmare involving orphaned accounts, infected clients, and unauditable silos of user activity data left outside enterprise control.

The convergence of four key technologies provides an answer to the auditors: OTP second factor authentication for assurance, standardized audit log formats for correlation, a central policy enforcement point that is "aware" of client side security capabilities, and federated provisioning to manage account lifecycles on remote platforms. In this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.






BROWSE RELATED RESOURCES
Authentication | Cloud Security | Governance, Risk, Compliance (GRC) | Security Audits | Security Management | Security Policies | Security Tokens

View All Resources sponsored by Intel

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement