Risk
4/20/2009
05:23 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

RSA Offers Encryption Toolkit Free To Developers

New Share Project program will help build security into software from the ground up

SAN FRANCISCO -- RSA CONFERENCE 2009 -- RSA, the Security Division of EMC, here today launched a program that for the first time gives developers its encryption technology tools for free.

RSA traditionally had licensed only its BSAFE encryption technology, which can cost customers tens of thousands of dollars, but company officials say the timing is right to give developers easier access to tools for building more security features into applications from the ground up, rather than tacking them on later. The new Share Project is an online community for developers that provides support, information, and free downloads of RSA's encryption toolkits for C/C++ and Java. The company plans to offer more free security tools under the program, as well.

"People want more secure products, not more security products," says Tom Corn, vice president for product marketing at RSA. "This is an information security ecosystem."

And to generate a little buzz around its new open community, RSA also announced a $10,000 prize for the developer who comes up with the most creative and practical use of its BSAFE encryption in a Web-based application. The contest runs until May 20; RSA is accepting entries on the RSA Share Project community Website.

The BSAFE Share toolkits are interoperable with existing products based on BSAFE encryption, which span various types of applications, from browsers to gaming systems. RSA says the idea is to spread the technology to smaller application developers and to organizations that want to build security into their internal apps. "This will get to a broader audience of people building the next generation of products," Corn says. "We think it addresses a void between the traditional market for BSAFE and the open source community."

This doesn't mean RSA is making any moves out of the encryption business. RSA will continue licensing its FIPS 140-based version of BSAFE, and Corn says the free tools are an example of RSA doing even more with encryption.

"There are a lot of really tough problems in encryption, and it continues to be a big market for us in key management, for example, and sharing encrypted data across multiple applications," he says.

Built-in encryption is one piece of the broader goal of writing more secure applications, with such high-profile industry efforts as BSIMM, OpenSAMM, Homeland Security's Build Security In, and Microsoft's Software Development Lifecycle (SDLC) getting large organizations' attention. RSA plans to collaborate with some of these secure coding efforts, as well, Corn says.

"We view the Share Project as part of the same secure coding issue," Corn says. "But it's bigger than just encryption -- encryption is a part of building more secure applications."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3407
Published: 2014-11-27
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888.

CVE-2014-4829
Published: 2014-11-27
Cross-site request forgery (CSRF) vulnerability in IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allows remote attackers to hijack the authentication of arbitrary users for requests tha...

CVE-2014-4831
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to hijack sessions via unspecified vectors.

CVE-2014-4832
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to obtain sensitive cookie information by sniffing the network during an HTTP session.

CVE-2014-4883
Published: 2014-11-27
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?