Home / / Novell cloud security as a service on the horizon

Novell cloud security as a service on the horizon

Will soon unveil what it claims is the industry’s first cloud computing security as a service, which is currently in a private beta stage

Bahrain telco benefits from sales boost and valuation changes in available-for-sale investments.
Bahrain telco benefits from sales boost and valuation changes in available-for-sale investments.

Novell is soon to unveil what it claims is the industry’s first cloud computing security as a service, which is currently in a private beta stage.

The networking vendor says that the service — slated for revealing in the US at the end of the month — provides identity and access management for hosted applications and hosted storage, as well as a compliance reporting suit.

Novell is aiming the service at cloud providers so that they can boost their security credentials in front of customers and hopefully quell CIO fears about the safety of the cloud computing model.

"Cloud computing is the on-ramp to tomorrow's transparent and trustworthy computing model, where on- and off-premise components drive the dynamic enterprise," said Dipto Chakravarty, vice president of worldwide engineering at Novell.

"Security concerns are the number one inhibitor to enterprises adopting cloud computing. Any cloud assets used by an enterprise must be treated as an extension of the data centre with the policies and procedures in place to enforce regulatory compliance and prudent business practices. Cloud computing will not be successful if it forces the enterprise to engage a separate and distinct operating environment," added Chakravarty.

Making use of the service allows end-users to treat the cloud as a natural extension of their data centre by delivering single sign-on capabilities using a federated enterprise identity model, made possible says Novell, by its “annexation” technology.

The Novell cloud computing service lets businesses use cloud applications and assets with the assurance that their specific corporate security policies and regulatory concerns will be enforced in the cloud. Users are able to cordon off a proportion of the cloud via proxy technology and use it temporarily under their own security parameters, releasing it when it has served its purpose. The vendor makes the further claim that it is the only firm to offer both single sign-on and support for the sharing of roles, policies and workflows in a cloud computing environment.