Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

CSC Partners with Symplified on Cloud IAM Solution

CSC today announced a cloud-based Identity and Access Management (IAM) solution built in partnership with Boulder, Colorado based cloud security company, Symplified.

CSC today announced a cloud-based Identity and Access Management (IAM) solution built in partnership with Boulder, Colorado based cloud security company, Symplified.

CSC LogoSymplifiedThe new product, CSC CloudIAM, addresses some of the security and technical challenges faced by government and commercial enterprises looking to transition applications to the cloud. This is accomplished by leveraging clients’ existing credential stores and extending to them IAM features such as Single Sign-On (SSO), Role-Based Access (RBAC) and centralized audit logging for Software-as-a-Service (SaaS) applications. CloudIAM helps to overcome a primary inhibitor to cloud adoption – the management of access and control – when cloud-based SaaS applications are delivered by different service providers.

CloudIAM will enable organizations to:

• Provide an SSO experience to employees that maintains control over user credentials.

• Crontrol access to applications based on individual employee functions.

• Provide automated on-boarding and off-boarding to improve efficiency and eliminate security holes when employees are hired and depart the company.

• Have the ability to quickly and efficiently respond to requests for detailed access logs for SaaS applications to meet compliance auditing requirements.

“CloudIAM is perfectly suited for companies that have a mixture of in-house and SaaS applications, and are experiencing difficulties managing identity and access,” said Siki Giunta, vice president, Cloud Computing and Software Services, CSC. “By offering this solution, CSC is providing the end-to-end capabilities that break down barriers to cloud adoption and help businesses achieve the agility, efficiency and competitive advantages of as-a-service.”

Advertisement. Scroll to continue reading.

“In order for large enterprises and government agencies to adopt Cloud computing, they must be able to integrate this new environment with their existing IT infrastructures and enforce the requisite levels of security, access control, and policy enforcement,” said Eric Olden, CEO and Founder of Symplified.

CloudIAM is deployed from CSC’s data centers, and is being introduced first in North America with EMEA and other regions soon to follow. Initial set-up includes access to the administrative portal, seat license per end user, connectors to hundreds of leading SaaS and private cloud applications, ongoing administration, and customer support and training for local administrators of the solution. Optional CSC services for CloudIAM include IAM consulting and the creation of additional connectors which enable CloudIAM to control access to any SAML or HTTP-based application.

Symplified is based in Boulder, Colorado, with offices in Silicon Valley, Washington DC, and Boston, recently closed a $9.2 million Series B round of venture capital financing, and has raised a total of $18.8M to date. The company is led by Eric Olden, CEO and Jonti McLaren, COO, who co-founded Securant Technologies which grew to nearly 300 employees before its $134.5 million acquisition by RSA in 2001. Darren Platt, previously VP of Engineering at Securant, is a co-founder and CTO at Symplified.

Read more news and expert columns in SecurityWeek’s Cloud Security Section

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.