Risk
4/20/2009
05:23 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

RSA Offers Encryption Toolkit Free To Developers

New Share Project program will help build security into software from the ground up

SAN FRANCISCO -- RSA CONFERENCE 2009 -- RSA, the Security Division of EMC, here today launched a program that for the first time gives developers its encryption technology tools for free.

RSA traditionally had licensed only its BSAFE encryption technology, which can cost customers tens of thousands of dollars, but company officials say the timing is right to give developers easier access to tools for building more security features into applications from the ground up, rather than tacking them on later. The new Share Project is an online community for developers that provides support, information, and free downloads of RSA's encryption toolkits for C/C++ and Java. The company plans to offer more free security tools under the program, as well.

"People want more secure products, not more security products," says Tom Corn, vice president for product marketing at RSA. "This is an information security ecosystem."

And to generate a little buzz around its new open community, RSA also announced a $10,000 prize for the developer who comes up with the most creative and practical use of its BSAFE encryption in a Web-based application. The contest runs until May 20; RSA is accepting entries on the RSA Share Project community Website.

The BSAFE Share toolkits are interoperable with existing products based on BSAFE encryption, which span various types of applications, from browsers to gaming systems. RSA says the idea is to spread the technology to smaller application developers and to organizations that want to build security into their internal apps. "This will get to a broader audience of people building the next generation of products," Corn says. "We think it addresses a void between the traditional market for BSAFE and the open source community."

This doesn't mean RSA is making any moves out of the encryption business. RSA will continue licensing its FIPS 140-based version of BSAFE, and Corn says the free tools are an example of RSA doing even more with encryption.

"There are a lot of really tough problems in encryption, and it continues to be a big market for us in key management, for example, and sharing encrypted data across multiple applications," he says.

Built-in encryption is one piece of the broader goal of writing more secure applications, with such high-profile industry efforts as BSIMM, OpenSAMM, Homeland Security's Build Security In, and Microsoft's Software Development Lifecycle (SDLC) getting large organizations' attention. RSA plans to collaborate with some of these secure coding efforts, as well, Corn says.

"We view the Share Project as part of the same secure coding issue," Corn says. "But it's bigger than just encryption -- encryption is a part of building more secure applications."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice one
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0702
Published: 2015-04-20
Unrestricted file upload vulnerability in the Custom Prompts upload implementation in Cisco Unified MeetingPlace 8.6(1.9) allows remote authenticated users to execute arbitrary code by using the languageShortName parameter to upload a file that provides shell access, aka Bug ID CSCus95712.

CVE-2015-0703
Published: 2015-04-20
Cross-site scripting (XSS) vulnerability in the administrative web interface in Cisco Unified MeetingPlace 8.6(1.9) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCus95857.

CVE-2015-1235
Published: 2015-04-19
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.

CVE-2015-1236
Published: 2015-04-19
The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a cr...

CVE-2015-1237
Published: 2015-04-19
Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages ...

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.