Cloud management practices

Share this article:
Michael Ginsberg
Michael Ginsberg
Single sign-on and encryption policies are putting credential management – and in particular public key infrastructure (PKI) – under closer scrutiny these days. The spotlight has become more intense as we witness the meteoric rise in mobile devices for business use, as well as the growing reliance on the cloud for application development and delivery. Developers, for one, are facing a growing need to expand authentication processes to enable secure sign-on and encryption from any device. Authenticating access to cloud-based applications is also putting an increasing strain on development requirements.

Recent breaches have shown that password protection is simply not enough, as organizations deal with increasingly stringent legislative demands for authentication. Even so-called encryption features in mobile devices are proving to be tantamount to locking a door and leaving the key under the mat for others to break in. Historically, deployment of PKI entails a high total cost of ownership, as vendor-provided PKI solutions typically require extensive management and in-house IT support.

Rather than investing in a full-blown and costly PKI infrastructure, however, developers can now turn to third-party platforms to meet their credential management needs, either in the cloud or at the endpoint (i.e., the mobile device). By “plugging into” a full PKI infrastructure that operates the digital certificates for them, developers can eliminate the cost impediment associated with credential management and apply the needed security measures across multiple applications.

When selecting a third-party vendor for data encryption and credential management, the onus is on IT managers to ensure that that vendor is leveraging a PKI-based technology and working with a provider that also can protect sensitive information on endpoint devices and in the cloud. With the right third-party resources, businesses will ultimately reap the full benefit of credential management at a much lower cost.

This article originally appeared in the October edition of SC Magazine.

Share this article:

Next Article in Opinions

Sign up to our newsletters

More in Opinions

The cool factor: New tech in banking has an edge

The cool factor: New tech in banking has ...

Disruption is expected; financial crime should be, too.

Me and my job: James Hill senior security architect, Consolidated Data Services

Me and my job: James Hill senior security ...

James Hill senior security architect, Consolidated Data Services (CDS), discusses his role at his organization.

Ahead in the cloud

Ahead in the cloud

Growth businesses are always looking for flexible ways of working that reduce capital and running costs, while securely delivering the data users need, when and where they need it.