Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Intel Releases Cloud-based Single Sign-On Service

Intel has released a single sign-on application that will enable enterprises to use Salesforce.com credentials on all of the Force.com applications, in addition to scores of others across the Web. More over, Intel’s Cloud SSO service offers two-factor authentication options and has detailed reporting implemented from the start.

Intel has released a single sign-on application that will enable enterprises to use Salesforce.com credentials on all of the Force.com applications, in addition to scores of others across the Web. More over, Intel’s Cloud SSO service offers two-factor authentication options and has detailed reporting implemented from the start.

Intel LogoIntel’s SSO offering will allow enterprise employees use their Salesforce.com credentials on Box.com, WebEx, Google Apps, and other internal applications. The offering comes with an easy to use point-and-click provisioning system that also comes coupled with extensive reporting.

Additional layers of security are included as well, as Intel’s latest and greatest also leverages two-factor authentication, so that a one-time password can be sent to a user’s mobile device (iOS, RIM, Android).

“Today, outsourcing identity and security as a service is a viable, fully functional and economical option for companies of all sizes,” said Girish Juneja, director, Intel Application Security and Identity Products.

“The prospect of removing security complexity and relieving the burden of providing connectivity to an ever-increasing list of SaaS apps just makes business sense.”

A trial version of Intel’s SSO offering is available now on Salesforce.com’s AppExchange.

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cloud Security

Orca Security published details on four server-side request forgery (SSRF) vulnerabilities impacting different Azure services.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

Strata Identity has raised $26 million in a Series B funding round led by Telstra Ventures, with additional investment from Forgepoint Capital, Innovating Capital,...