ADVISOR DETAILS

RECENT BLOG POSTS

Webinar: Applying Strong Authentication and Data Loss Prevention to Collaborative File Sharing (April 26)

Join us for what will be a very informative webinar on Applying Strong Authentication and Data Loss Prevention to Collaborative File Sharing April 26th 2012 – Time: 10:00 AM PDT, 1:00 PM EDT > Register Now Employees love the convenience … Continue reading

The post Webinar: Applying Strong Authentication and Data Loss Prevention to Collaborative File Sharing (April 26) appeared first on Cloud Access Security@Intel.

Read more >

March 29th Analyst Webinar – Identity and Access Management in the Cloud: Real or Mirage?

    Traditional IAM solutions have not kept pace with cloud innovation and new approaches to identity and access management are gaining ground. Should you move your IAM infrastructure to the cloud? What is the role of related standards? These … Continue reading

The post March 29th Analyst Webinar – Identity and Access Management in the Cloud: Real or Mirage? appeared first on Cloud Access Security@Intel.

Read more >

RSA 2012 Interview with Andy Thurai, Chief Architect of Intel’s Application Security & Identity Products Group

Watch this interview between Tom Field and Intel Application Security & Identity Products Group, Chief Architect Andy Thurai.  Andy talks about API management and the attendant issues including security, management, auditing, metering, monitoring and monetization. You’ll hear Andy talk about … Continue reading

The post RSA 2012 Interview with Andy Thurai, Chief Architect of Intel’s Application Security & Identity Products Group appeared first on Cloud Access Security@Intel.

Read more >

Gunnar Peterson on Understanding Cloud Security Standards, part 3

Moving applications to the Cloud puts many enterprises in an accustomed position, the technology and processes that their business depends on aren’t under their sole control, but rather a mix of responsibilities. The move to the Cloud is not a … Continue reading

The post Gunnar Peterson on Understanding Cloud Security Standards, part 3 appeared first on Cloud Access Security@Intel.

Read more >

Government Solutions Resource Center

If you haven’t already seen it, Intel® Application Security & Identity Products has released a new Government Solutions Resource Center  that is a must-see. Whether you are looking for information on Identity Credential Access Management, High Assurance, Cross Domain Information Sharing, NIEM, NSTIC or other info about other current Government concerns, I highly recommend you [...] Read more >

Intel® And Box® Join Forces For Increased User Convenience And Security

Cloud-based solutions empower organizations to exploit leading-edge technology, reduce costs, and improve productivity. A prime example is using secure file sharing solutions like Box® (www.box.com) to enhance collaboration, both within the organization and between enterprises. Today, we are pleased to … Continue reading

The post Intel® And Box® Join Forces For Increased User Convenience And Security appeared first on Cloud Access Security@Intel.

Read more >

Security Expert, Gunnar Peterson, on Understanding Cloud Security Standards, Part 2

For any technology, it’s important to understand what problems it’s meant to address. In the last post we looked at Cloud Security Anti-Patterns. An Anti-Pattern represents an ineffective or counterproductive practice. In moving to the Cloud several Anti-Patterns have emerged … Continue reading

The post Security Expert, Gunnar Peterson, on Understanding Cloud Security Standards, Part 2 appeared first on Cloud Access Security@Intel.

Read more >

Webinar: Federal Cloud Security Initiatives Explained – Choosing the Right Standards and Technologies

Join us on 10/6 at 2pm Eastern Time for an exciting and informative webinar:   Federal Cloud Security Initiatives Explained – Choosing the Right Standards and Technologies   Mapping the alphabet soup of federal cloud security initiatives is a daunting … Continue reading

The post Webinar: Federal Cloud Security Initiatives Explained – Choosing the Right Standards and Technologies appeared first on Cloud Access Security@Intel.

Read more >

Security Expert, Gunnar Peterson, on Understanding Cloud Security Standards, Part 1

A long time information security friend with long experience in crypto products and projects, said to me recently, “I just started getting involved in identity stuff, and I felt like I was back in the 1990s crypto days, so many … Continue reading

The post Security Expert, Gunnar Peterson, on Understanding Cloud Security Standards, Part 1 appeared first on Cloud Access Security@Intel.

Read more >

Forrester Cloud Jam Session DAY 2: The Authoritative ID Store Is Dead – How the Cloud Changes Provisioning

Join us this Thursday, July 28, 2011 at 1PM Pacific (replay will be available after initial broadcast) as Andras Cser, Principal Analyst, Forrester and Vikas Jain, Director of Product Management, Intel Cloud Identity & Security shed light on how account … Continue reading

The post Forrester Cloud Jam Session DAY 2: The Authoritative ID Store Is Dead – How the Cloud Changes Provisioning appeared first on Cloud Access Security@Intel.

Read more >

Forrester Cloud Jam Session DAY 1: Adaptive Strong Auth & Federated SSO – The New Power Couple

Join us this Wednesday, July 27, 2011 at 10am Pacific (replay will be available after initial broadcast) as Eve Maler, Principal analyst at Forrester and Vikas Jain, Director of Product Management for Intel Cloud Identity and Security shed light on … Continue reading

The post Forrester Cloud Jam Session DAY 1: Adaptive Strong Auth & Federated SSO – The New Power Couple appeared first on Cloud Access Security@Intel.

Read more >

Security Expert, Gunnar Peterson, on Leveraging Enterprise Credentials to connect with Cloud applications

Many pundits say that you must pick a Cloud Provider and trust them. I beg to differ. First off why should we trust the Cloud Provider? A Cloud Consumer wants to leverage the Cloud Provider’s capabilities for functionality and scale … Continue reading

The post Security Expert, Gunnar Peterson, on Leveraging Enterprise Credentials to connect with Cloud applications appeared first on Cloud Access Security@Intel.

Read more >

Providing fine grained access to SalesForce and Google Apps

Companies that move to Cloud Providers like Salesforce and Google apps quickly discover that part of the migration involves revisiting their security model. Authentication, authorization, account management, and federation are on the menu of activities for most organizations as they … Continue reading

The post Providing fine grained access to SalesForce and Google Apps appeared first on Cloud Access Security@Intel.

Read more >

CloudTweaks.com Discusses Expressway Cloud Access 360

Make sure to read the informative and insightful discussion about Intel Expressway Cloud Access 360 between Intel Director of Product Management for Application Security and Identity Products, Vikas Jain, and Anthony Park, from Cloudtweaks.com. Read the post and understand why … Continue reading

The post CloudTweaks.com Discusses Expressway Cloud Access 360 appeared first on Cloud Access Security@Intel.

Read more >