Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:47 PM
Dark Reading
Dark Reading
Products and Releases

Skytap Announces New Security And Control Features

Skytap also released configurable options for virtual data centers and advanced networking

SEATTLE, WA – May 24, 2011 - Skytap, the leading provider of self-service cloud automation solutions, today announced the company has achieved strong customer adoption of its self-service hybrid cloud offering, signing many enterprise customers including Wolters Kluwer, Purdue University and Trek Bicycles. Skytap also announced the availability of new security features including IP access limits, browser validation and user email verification. When combined with existing features such as granular role-based access control, groups, project roles, configurable password policies and self-service hybrid cloud capabilities, Skytap offers a comprehensive security policy and cloud control solution for IT organizations.

“Our business required the ability to manage cloud environments with the security and control of our IT policies while benefiting from the scale and flexibility provided by a cloud solution,” said David Anderson, director of software quality assurance at Wolters Kluwer Financial Services. “Skytap allowed us to securely connect our in house environments to the cloud. We now have on-demand, self-service access to our cloud environments and realized a substantial reduction in set-up time, operational costs and increased our testing agility to bring new releases to market faster.”

Most enterprise customers are choosing to implement hybrid cloud architectures so they can reap the benefits of connecting cloud instances to corporate data centers quickly and securely. Skytap’s hybrid cloud offering, unveiled in February 2011, has enabled these customers to accelerate cloud integration with in-house systems and reduce the IT support burden for managing cloud environments. Application developers can now develop and test advanced enterprise applications using Skytap Cloud and connect to corporate databases and file systems securely.

While the cloud model changes the way dynamic IT environments are deployed and managed, it must provide the same security and policy controls used by in-house IT to protect sensitive applications and data. To meet these requirements, Skytap is introducing the following security and control features:

>> IP Access Limits: IT administrators can now limit user access to the Skytap Cloud based on known IP ranges. Similar to Salesforce.com, this new feature will block users from accessing Skytap cloud resources from locations not considered to be secure. IP Access Limits can be configured for all users. The IT administrator can also configure additional password requirements, granular access controls and role-based privileges using Skytap’s intuitive self-service interface.

>> Browser Validation: This security feature can be configured to require users to authorize the specific browsers that may be used with the account. User access will be required to validate that particular web browser through a special security link. Unauthorized browsers will be blocked from accessing the Skytap environments.

>> Email Validation: This feature requires users to validate the email address provided as a part of their account profile. With this added control capability, Skytap users can be assured that secure notifications and alerts from the system will only reach the emails that have been approved and provided by the user and IT administrator.

Skytap also released configurable options for virtual data centers (VDCs) and advanced networking.

>> Large and Extra Large Virtual Machines (VMs): Application developers can now create virtual machines with up to 8 CPUs and 32 GB RAM. Using these large machines, enterprises can easily run larger instances of Sharepoint, CRM Dynamics, SAP, Oracle and other advanced enterprise applications.

>> User Selectable High performance NICs: Network engineers and testers can now create VMs with network adaptors that provide high performance.

“The use of public and private cloud technologies raises security and management challenges, but none that are impossible to meet. In order to effectively and efficiently secure the use of cloud computing, enterprises need to match threats and business demands with the right management security approach. Public, private and hybrid cloud technologies will also present opportunities to develop new architectures and processes that will advance security and management capabilities in ways that were not possible with physical computing restrictions.”*

“Enterprises are seeking stronger security policy management, access controls and role based permission management as they adopt the cloud model,” said Sundar Raghavan, chief product and marketing officer at Skytap. “With this release, Skytap is enabling IT organizations to implement access control policies in the cloud that will give them the same visibility and access control they get in in-house systems”.

*Gartner, Inc., Key Issues for Security Public and Private Cloud Computing, John Pescatore, April 15, 2011.

About Skytap, Inc.

Skytap is the leading provider of self-service cloud automation solutions for dynamic workloads. Skytap enables users to run enterprise applications unchanged in the cloud, collaborate securely with global teams, and gain unparalleled business productivity. Additionally, IT organizations can gain visibility and control over cloud projects, align capacity with demand, and reduce costs by 70% or more. Enterprises can securely connect Skytap to their data centers and create virtual private clouds. Skytap is ideal for any dynamic workload including application development, testing, virtual training, application migration and sales demonstration projects. To buy or learn more, visit www.skytap.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.