RSA Establishes Cloud Trust Authority To Accelerate Cloud Computing Adoption

RSA, The Security Division of EMC, recently announced the RSA Cloud Trust Authority, a set of cloud-based services designed to facilitate secure and compliant relationships among organizations and cloud service providers. 

By enabling visibility and control over identities, information and infrastructure, the RSA Cloud Trust Authority will foster the trust necessary for organizations to adopt cloud computing for mission-critical applications and sensitive information.  To further support and strengthen this requirement, EMC announced the new EMC Cloud Advisory Service with Cloud Optimizer  from EMC Consulting, which helps customers create a balanced cloud strategy extending from legacy architectures through cloud service providers at the lowest cost while achieving trust objectives.

"Surveys show that lack of trust in cloud computing is slowing broader adoption of cloud services," said Art Coviello, executive chairman of RSA, the Security Division of EMC.  "While cloud computing offers tremendous benefits in cost and agility, it breaks down some of the traditional means of ensuring visibility and control of infrastructure and information.  Forcing enterprises to develop trusted relationships individually with each cloud service provider they wish to use is cumbersome and will not scale. New thinking in security and compliance is required to provide a future in which organizations can consume services from a wide variety of cloud service providers on-demand and for all their application needs."

Organizations will be able to manage relationships with cloud service providers via the RSA Cloud Trust Authority console making it easy to configure and deploy cloud-based security services. 

The system is being architected to greatly streamline the ongoing management of trusted relationships eliminating the need for multiple point-to-point integrations involving custom code with both organizations and service providers.  The RSA Cloud Trust Authority will make it easier for organizations to adopt cloud computing and will give cloud service providers the opportunity to deliver classes of applications that previously would be off-limits due to security or compliance concerns.

"Today, enterprises wanting to leverage one or more cloud service providers have to create secure access methods, establish compliance measurement and data controls and solve a number of other security challenges," said Drew Simonis, group information security officer with Willis Group Holdings, plc. "The complexity and cost of establishing trusted relationships with each provider erodes the value of cloud computing by slowing down the ability to provision new providers as part of the total IT portfolio. The approach RSA is taking with the RSA Cloud Trust Authority holds promise for changing that by creating an intermediary for hosted security and compliance services and will move the burden of establishing trusted cloud computing from the customer to the cloud."

"The fundamental value of the RSA Cloud Trust Authority approach to services providers is that it helps eliminate a key source of friction slowing down adoption of cloud computing -- the requirement to ensure security and compliance across their enterprise IT resources and their outsourced cloud-based resource," said Ken Owens, vice president of security and cloud technology with  Savvis.   "By offering an elegant model for customers to establish trusted relationships with service providers more rapidly, RSA's approach will accelerate the adoption of our services by a wider set of customers for security-sensitive applications."

Cloud Trust Authority Initial Offerings

Identity Service:  Among the highlights of the RSA Cloud Trust Authority's inaugural set of capabilities is its Identity Service.  This service will be powered by VMware's forthcoming Project Horizon, a cloud-based management service with the mission of delivering simple, secure end-user access and provisioning to applications and data across the widest range of end-user devices.  The Identity Service will be designed to enable a customer to manage secure user access and user provisioning to multiple cloud providers via federated single sign-on and directory synchronization.   It will be engineered to enable federated identity management among an enterprise and its cloud service providers, or among multiple cloud service providers themselves with options for strong authentication using RSA SecurID technology.

Compliance Profiling Service: Leveraging the RSA Archer GRC platform, the Compliance Profiling Service will be engineered to enable customers to view the trust profiles of various cloud providers against a set of common benchmarks developed by the Cloud Security Alliance among other security frameworks.  This first-ever cloud compliance solution is a step towards more automated compliance for cloud services.  By providing centralized access to security profiles of various cloud providers against a common benchmark, RSA will make it easier for enterprises to rapidly add capabilities and on-board new cloud service providers, dramatically lowering the barriers to trusted cloud computing.

"Security remains top of mind for organizations that wish to leverage the public cloud more extensively," said Jim Reavis, executive director of the Cloud Security Alliance.  "The standards and recommendations developed by the Cloud Security Alliance are most effective when they are put into practice by the security industry.  RSA has contributed actively to the Cloud Security Alliance standards and was among the first to embrace the Cloud Security Alliance standards within its products.  With the RSA Cloud Trust Authority, RSA is taking another decisive step towards delivering comprehensive and innovative solutions for securing the cloud.  The approach of delivering cloud security services spanning identity, information, and infrastructure will address key concerns that limit the adoption of the cloud."

The RSA Cloud Trust Authority is part of a more complete portfolio of offerings being created by EMC to simplify the customer journey to cloud computing.  Announced recently, EMC's new Cloud Advisory Service with Cloud Optimizer is a strategic offering by EMC Consulting to assist customers in evaluating workloads for suitability to move to cloud models: private, public and hybrid.  The new service helps customers develop a strategy for optimizing the placement of workloads by looking at three factors -- economics, trust and functionality -- to maximize cost savings and business agility.  Working with the customer, EMC Consulting helps to create a transformational plan including people, process, and technology required for customers to successfully move to a balanced cloud model and experience up to 24 percent savings.

A beta of the RSA Cloud Trust Authority will be available in the second half of 2011, and will include both Identity and Compliance offerings. 

"The Cloud Trust Authority is a very strategic investment area for RSA, one with direct involvement of virtually every technology team across the division.  We will be actively engaging with both enterprises and cloud service providers right away in shaping the future of this solution," said Tom Corn, chief strategy officer with RSA. "Trusted relationships only work with the active engagement of all parties. We see enterprises and service providers as participants in shaping the RSA Cloud Trust Authority.  The beta program will lay the foundation for broad-based rollout of these services."

 

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities