Managing who gets to access which applications, and when, within the enterprise is challenging enough. Trying to manage that in addition to a bevy of cloud applications outside the enterprise makes the management of application security a complicated task that most IT organizations don’t have the tools in place to handle.
Looking to address that issue, Dell has become the latest vendor to provide a mechanism for managing access to applications both inside and out of the enterprise in the cloud. Launched at the Dell Technology Camp 2013 conference today, the Dell One Identity Cloud Access Manager has the ability to manage access to external applications even though it runs on premise.
It’s part of Dell’s expanding Connect Security portfolio of security offerings, and Jonathan Sander, director of identity and access management (IAM) product strategy for Dell Software, says that rather than trying to impose a comprehensive security framework as an all-or-nothing proposition, Dell is taking a more modular approach that gives customers the option to deploy a layered security approach based on Dell security offerings or use any one of those offerings as part of a multi-vendor, in-depth security strategy.
While some organizations firmly stand behind multi-vendor approaches to security in depth, the total cost of security can be substantially less when multiple layers of integrated security from a single vendor are relied on. Because there’s no one right answer, Sander says Dell prefers to let each customer decide which type of security strategy best fits their needs.https://o1.qnsr.com/log/p.gif?;n=203;c=204663295;s=11915;x=7936;f=201904081034270;u=j;z=TIMESTAMP;a=20410779;e=i
In addition to announcing Dell One Identity Cloud Access Manager, Dell today announced a Dell SonicWALL NSA 2600 next-generation firewall that makes use of a new content inspection engine, version 6.0 of Dell ChangeAuditor 6.0, that better correlates changes to configurations across the overall IT environment, and version 10.7 of Dell InTrust that collects system log information in real time for forensic analysis.
Obviously, a lot of nuance goes into IT security these days. In general, however, starting over from scratch isn’t a viable option for most organizations. The challenge is figuring out the right path to implementing a layered security strategy that works in the context of both the actual information at risk and the amount of dollars available to defend it.