Risk
4/20/2009
05:23 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

RSA Offers Encryption Toolkit Free To Developers

New Share Project program will help build security into software from the ground up

SAN FRANCISCO -- RSA CONFERENCE 2009 -- RSA, the Security Division of EMC, here today launched a program that for the first time gives developers its encryption technology tools for free.

RSA traditionally had licensed only its BSAFE encryption technology, which can cost customers tens of thousands of dollars, but company officials say the timing is right to give developers easier access to tools for building more security features into applications from the ground up, rather than tacking them on later. The new Share Project is an online community for developers that provides support, information, and free downloads of RSA's encryption toolkits for C/C++ and Java. The company plans to offer more free security tools under the program, as well.

"People want more secure products, not more security products," says Tom Corn, vice president for product marketing at RSA. "This is an information security ecosystem."

And to generate a little buzz around its new open community, RSA also announced a $10,000 prize for the developer who comes up with the most creative and practical use of its BSAFE encryption in a Web-based application. The contest runs until May 20; RSA is accepting entries on the RSA Share Project community Website.

The BSAFE Share toolkits are interoperable with existing products based on BSAFE encryption, which span various types of applications, from browsers to gaming systems. RSA says the idea is to spread the technology to smaller application developers and to organizations that want to build security into their internal apps. "This will get to a broader audience of people building the next generation of products," Corn says. "We think it addresses a void between the traditional market for BSAFE and the open source community."

This doesn't mean RSA is making any moves out of the encryption business. RSA will continue licensing its FIPS 140-based version of BSAFE, and Corn says the free tools are an example of RSA doing even more with encryption.

"There are a lot of really tough problems in encryption, and it continues to be a big market for us in key management, for example, and sharing encrypted data across multiple applications," he says.

Built-in encryption is one piece of the broader goal of writing more secure applications, with such high-profile industry efforts as BSIMM, OpenSAMM, Homeland Security's Build Security In, and Microsoft's Software Development Lifecycle (SDLC) getting large organizations' attention. RSA plans to collaborate with some of these secure coding efforts, as well, Corn says.

"We view the Share Project as part of the same secure coding issue," Corn says. "But it's bigger than just encryption -- encryption is a part of building more secure applications."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0543
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2015-0544
Published: 2015-07-05
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly generate random values for session cookies, which makes it easier for remote attackers to hijack sessions by predicting a value.

CVE-2015-2721
Published: 2015-07-05
Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attacke...

CVE-2015-2722
Published: 2015-07-05
Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.

CVE-2015-2724
Published: 2015-07-05
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code v...

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report