Secure virtual profiles and collaboration portals Virtual profiles and
collaboration portals are typically used by organizations
that have common but often competing interests. This can create dynamic
cost efficient environments for users to share and protect, their
property, resources, and information.
More security
While on-line banking requires good security for some of the same reasons,
virtual profile and collaboration portal applications usually also provide
more functionality, depth, and volume of add, search, and retrieve data operations,
as well as much more sophisticated rights and privileges configurations.
Single application example
If, for example, a vehicle on-board monitoring computer manufacturer sets up
a secure fleet management portal for the trucking industry, providing each client
trucking company with on-line tracking and personalized reporting on every aspect
of its fleet, vehicules, operators, transactions, using real-time tracking data
transmitted directly from the vehicules to the portal application and storage
servers, at a very reasonable cost, and also allows the trucking client organizations
to sell, rent, trade resources like vehicles, trailers, terminals, etc., as well as
allow each to have its own set of web pages, meeting and chat areas, etc.,
also directly on the portal, security has to go very deep. Perimeter security won't
suffice.
More applications
The case for security is similar when sharing medical, legal, or other
virtual profiles on the Web,
often retrieving record information from multiple and varied
sources, anywhere, any time, dynamically, into secure virtual profiles, where
everyone entitled can only access the data that each is entitled to,
in any given context. Some portals may also require to concurrently support many
such applications, further compounding security requirements.
Competing collaborators
Also, collaboration is efficient, for competitors as for others. Consequently,
many new security issues are related to sharing and collaboration,
while insuring privacy and confidentiality.
IT Security Today
Most of the computer security protection today focuses on detecting and preventing
network, system, and application intrusion and malaware. Also, with authentication,
authorization, and user security profiles applications can prevent access to some of
their functions and operations, although preventing access to functionality is
contrary to providing users with more functionality. Finally, contents can be
encrypted to prevent and limit interception damages.
Who? What? When? How?
As portals and distributed environments develop, managing 'who can access what, when, how?'
quickly becomes deep application and business logic concerns. As security and security
configuration evolve, they severely affect the application and its business logic
code, often imposing complex application modifications, as well as portal and
application re-testing and re-deploying, usually not trivial tasks, especially
in large mission critical environments.
DNAOS Security DNAOS support current available
authentication, authorization, encryption services, including SSL, LDAP, certificates.
DNAOS entitlement services also protect distributed
virtual profiles, resources, and contents, with unlimited granularity, network structures,
and graphical distributed resource and content entitlement and structure modeling.
DNAOS are built around entitlement secure distributed
application resource management services.
|