Risk
4/20/2009
05:23 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

RSA Offers Encryption Toolkit Free To Developers

New Share Project program will help build security into software from the ground up

SAN FRANCISCO -- RSA CONFERENCE 2009 -- RSA, the Security Division of EMC, here today launched a program that for the first time gives developers its encryption technology tools for free.

RSA traditionally had licensed only its BSAFE encryption technology, which can cost customers tens of thousands of dollars, but company officials say the timing is right to give developers easier access to tools for building more security features into applications from the ground up, rather than tacking them on later. The new Share Project is an online community for developers that provides support, information, and free downloads of RSA's encryption toolkits for C/C++ and Java. The company plans to offer more free security tools under the program, as well.

"People want more secure products, not more security products," says Tom Corn, vice president for product marketing at RSA. "This is an information security ecosystem."

And to generate a little buzz around its new open community, RSA also announced a $10,000 prize for the developer who comes up with the most creative and practical use of its BSAFE encryption in a Web-based application. The contest runs until May 20; RSA is accepting entries on the RSA Share Project community Website.

The BSAFE Share toolkits are interoperable with existing products based on BSAFE encryption, which span various types of applications, from browsers to gaming systems. RSA says the idea is to spread the technology to smaller application developers and to organizations that want to build security into their internal apps. "This will get to a broader audience of people building the next generation of products," Corn says. "We think it addresses a void between the traditional market for BSAFE and the open source community."

This doesn't mean RSA is making any moves out of the encryption business. RSA will continue licensing its FIPS 140-based version of BSAFE, and Corn says the free tools are an example of RSA doing even more with encryption.

"There are a lot of really tough problems in encryption, and it continues to be a big market for us in key management, for example, and sharing encrypted data across multiple applications," he says.

Built-in encryption is one piece of the broader goal of writing more secure applications, with such high-profile industry efforts as BSIMM, OpenSAMM, Homeland Security's Build Security In, and Microsoft's Software Development Lifecycle (SDLC) getting large organizations' attention. RSA plans to collaborate with some of these secure coding efforts, as well, Corn says.

"We view the Share Project as part of the same secure coding issue," Corn says. "But it's bigger than just encryption -- encryption is a part of building more secure applications."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-3304
Published: 2014-10-30
Directory traversal vulnerability in Dell EqualLogic PS4000 with firmware 6.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the default URI.

CVE-2013-7409
Published: 2014-10-30
Buffer overflow in ALLPlayer 5.6.2 through 5.8.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a .m3u (playlist) file.

CVE-2014-3446
Published: 2014-10-30
SQL injection vulnerability in wcm/system/pages/admin/getnode.aspx in BSS Continuity CMS 4.2.22640.0 allows remote attackers to execute arbitrary SQL commands via the nodeid parameter.

CVE-2014-3584
Published: 2014-10-30
The SamlHeaderInHandler in Apache CXF before 2.6.11, 2.7.x before 2.7.8, and 3.0.x before 3.0.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted SAML token in the authorization header of a request to a JAX-RS service.

CVE-2014-3623
Published: 2014-10-30
Apache WSS4J before 1.6.17 and 2.x before 2.0.2, as used in Apache CXF 2.7.x before 2.7.13 and 3.0.x before 3.0.2, when using TransportBinding, does properly enforce the SAML SubjectConfirmation method security semantics, which allows remote attackers to conduct spoofing attacks via unspecified vect...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.