07:21 PM
George V. Hulme
George V. Hulme

Identity Management As A Service

Just before the long July 4 holiday weekend, I had a chance to speak with on-demand identity management start-up Symplified. This vendor is well capitalized and has veteran IdM leadership at its helm. It also wants to "revolutionize" the identity and assessment management (IdM) market. And it just might do so.

Just before the long July 4 holiday weekend, I had a chance to speak with on-demand identity management start-up Symplified. This vendor is well capitalized and has veteran IdM leadership at its helm. It also wants to "revolutionize" the identity and assessment management (IdM) market. And it just might do so.It was just about two months ago when I blogged on why more security vendors should move their offerings to the cloud, or through a SaaS delivery model. It seems the folks behind Symplified would agree.

The benefits of SaaS are now, thanks to the likes of Salesforce.com, well understood. With no servers, databases, or software to install, manage, and update (i.e., patches and upgrades), it's often a much more affordable way to deliver software. And the services model doesn't require six-figure checks be signed before any software has been installed. The theory goes that IT and security managers save time and can focus more energy on keeping their infrastructure secure, and less on managing security software itself. Plus, with each upgrade or fix, all customers are instantly upgraded.

This model has served many software vendors, such as Salesforce, in the CRM market, and Qualys, with its on-demand vulnerability management services, very well.

And if there's any software category that has a hefty amount of hassles that enterprises would like to shrug away, it's identity management, which includes provisioning users to networked resources, managing and keeping directories synced, extending access and authentication rules to partners, suppliers, and customers, as well as the headaches associated with connecting various applications to identity management software.

That's where Symplified steps in. Its on-demand identity service aims to push most of those complexities out of the enterprise and onto Symplified's computing platform. The company, which just received $6 million in funding, provides two options. First, a hosted Identity Cloud, which is essentially a proxy that securely connects multiple identity domains and networks. The other option is an on-premise appliance, which the company has dubbed an Identity Router. The Identity Router acts just like a traditional IP router, only it connects multiple identity domains and networks.

Not only does this model promise to challenge the traditional software IdM delivery model, it also could break the IdM industry's addiction to agents, plug-ins, custom coding, and other hefty customization and integration costs that have burdened large organizations, and put many IdM options out of the financial reach of small and midsized businesses.

When I spoke with Symplified founder, CEO, and chairman Eric Olden last week, he explained how the system links with existing identity stores, such as LDAP, Active Directory, SQL Databases, and Web services, and how the authenticated sessions can be passed from the Web browser out to Web applications.

That's good news for any business struggling not only with its internal identity management systems, but those also wondering how they're going to securely connect with all of those SaaS offerings that seem to be springing up everywhere.

If you've been following the IdM market, you may have recognized Olden's name as an old-timer in the IdM market. He co-founded Securant with Jonti McLaren and was its president from 1995-1999, then CTO and CMO from 2000-2001, until Securant was acquired by RSA in 2001.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.