Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Verizon and Novell Partner On Cloud-Based Security Solution

Verizon and Novell have teamed up to provide “Secure Access Services from Verizon” – an on-demand identity and access management service providing enterprise clients more control and stronger security when accessing cloud based applications.

The service, powered by Novell technology, will enable enterprise clients to outsource the infrastructure and expertise required to extend and manage user access to cloud-based resources while maintaining control over policies and governance.

Verizon and Novell have teamed up to provide “Secure Access Services from Verizon” – an on-demand identity and access management service providing enterprise clients more control and stronger security when accessing cloud based applications.

The service, powered by Novell technology, will enable enterprise clients to outsource the infrastructure and expertise required to extend and manage user access to cloud-based resources while maintaining control over policies and governance.

Security is the No. 1 cloud concern among IT professionals, with some experts cautioning without an adequate identity management and security framework, enterprises are putting themselves at risk.

Using the new service, enterprises will have centralized management of applications and network services, identity federation and Web single sign-on — without additional hardware or software, or dedicated IT resources. The service also includes built-in audit features to assist with compliance reporting.

“Cloud computing is core to Verizon’s strategy,” said Kerry Bailey, senior vice president and chief marketing officer, Verizon Business. “By working with Novell as part of our overall cloud strategy, we’re providing our clients with a more agile, cost effective and scalable way of securing the enterprise cloud environment so they can reap the full benefits of cloud computing.”

The Verizon identity-as-a-service offering is the first wave of cloud-based solutions the two companies say they will deliver to large enterprises with 500 or more users. With these offerings, Verizon will extend its portfolio of “as-a-service” offerings including a recently announced partnership with IBM to provide a secure enterprise information backup service.

The Secure Access Services will be available to Verizon and Novell clients based in the U.S. starting in June.

Advertisement. Scroll to continue reading.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.