07:21 PM
George V. Hulme
George V. Hulme
Connect Directly

Identity Management As A Service

Just before the long July 4 holiday weekend, I had a chance to speak with on-demand identity management start-up Symplified. This vendor is well capitalized and has veteran IdM leadership at its helm. It also wants to "revolutionize" the identity and assessment management (IdM) market. And it just might do so.

Just before the long July 4 holiday weekend, I had a chance to speak with on-demand identity management start-up Symplified. This vendor is well capitalized and has veteran IdM leadership at its helm. It also wants to "revolutionize" the identity and assessment management (IdM) market. And it just might do so.It was just about two months ago when I blogged on why more security vendors should move their offerings to the cloud, or through a SaaS delivery model. It seems the folks behind Symplified would agree.

The benefits of SaaS are now, thanks to the likes of Salesforce.com, well understood. With no servers, databases, or software to install, manage, and update (i.e., patches and upgrades), it's often a much more affordable way to deliver software. And the services model doesn't require six-figure checks be signed before any software has been installed. The theory goes that IT and security managers save time and can focus more energy on keeping their infrastructure secure, and less on managing security software itself. Plus, with each upgrade or fix, all customers are instantly upgraded.

This model has served many software vendors, such as Salesforce, in the CRM market, and Qualys, with its on-demand vulnerability management services, very well.

And if there's any software category that has a hefty amount of hassles that enterprises would like to shrug away, it's identity management, which includes provisioning users to networked resources, managing and keeping directories synced, extending access and authentication rules to partners, suppliers, and customers, as well as the headaches associated with connecting various applications to identity management software.

That's where Symplified steps in. Its on-demand identity service aims to push most of those complexities out of the enterprise and onto Symplified's computing platform. The company, which just received $6 million in funding, provides two options. First, a hosted Identity Cloud, which is essentially a proxy that securely connects multiple identity domains and networks. The other option is an on-premise appliance, which the company has dubbed an Identity Router. The Identity Router acts just like a traditional IP router, only it connects multiple identity domains and networks.

Not only does this model promise to challenge the traditional software IdM delivery model, it also could break the IdM industry's addiction to agents, plug-ins, custom coding, and other hefty customization and integration costs that have burdened large organizations, and put many IdM options out of the financial reach of small and midsized businesses.

When I spoke with Symplified founder, CEO, and chairman Eric Olden last week, he explained how the system links with existing identity stores, such as LDAP, Active Directory, SQL Databases, and Web services, and how the authenticated sessions can be passed from the Web browser out to Web applications.

That's good news for any business struggling not only with its internal identity management systems, but those also wondering how they're going to securely connect with all of those SaaS offerings that seem to be springing up everywhere.

If you've been following the IdM market, you may have recognized Olden's name as an old-timer in the IdM market. He co-founded Securant with Jonti McLaren and was its president from 1995-1999, then CTO and CMO from 2000-2001, until Securant was acquired by RSA in 2001.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-10-30
Directory traversal vulnerability in Dell EqualLogic PS4000 with firmware 6.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the default URI.

Published: 2014-10-30
Buffer overflow in ALLPlayer 5.6.2 through 5.8.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .m3u (playlist) file.

Published: 2014-10-30
SQL injection vulnerability in wcm/system/pages/admin/getnode.aspx in BSS Continuity CMS 4.2.22640.0 allows remote attackers to execute arbitrary SQL commands via the nodeid parameter.

Published: 2014-10-30
The SamlHeaderInHandler in Apache CXF before 2.6.11, 2.7.x before 2.7.8, and 3.0.x before 3.0.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted SAML token in the authorization header of a request to a JAX-RS service.

Published: 2014-10-30
Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vect...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.