 Secure virtual profiles and collaboration portals
Virtual profilesandcollaboration portalsare typically used by organizations that have common but often competing interests.
This can create dynamic cost efficient environments for users to share and protect,
their property, resources, and information.
More security While on-line banking requires good security for some of the same reasons, virtual
profile and collaboration portal applications usually also provide more functionality,
depth, and volume of add, search, and retrieve data operations, as well as much more
sophisticated rights and privileges configurations.
Single application example If, for example, a vehicle on-board monitoring computer manufacturer sets up a secure
fleet management portal for the trucking industry, providing each client trucking
company with on-line tracking and personalized reporting on every aspect of its fleet,
vehicules, operators, transactions, using real-time tracking data transmitted directly
from the vehicules to the portal application and storage servers, at a very reasonable
cost, and also allows the trucking client organizations to sell, rent, trade resources
like vehicles, trailers, terminals, etc., as well as allow each to have its own set
of web pages, meeting and chat areas, etc., also directly on the portal, security
has to go very deep. Perimeter security won't suffice.
More applications The case for security is similar when sharing medical, legal, or othervirtual profileson the Web, often retrieving record information from multiple and varied sources,
anywhere, any time, dynamically, into secure virtual profiles, where everyone entitled
can only access the data that each is entitled to, in any given context. Some portals
may also require to concurrently support many such applications, further compounding
security requirements.
Competing collaborators Also, collaboration is efficient, for competitors as for others. Consequently, many
new security issues are related to sharing and collaboration, while insuring privacy
and confidentiality.
IT Security Today Most of the computer security protection today focuses on detecting and preventing
network, system, and application intrusion and malaware. Also, with authentication,
authorization, and user security profiles applications can prevent access to some
of their functions and operations, although preventing access to functionality is
contrary to providing users with more functionality. Finally, contents can be encrypted
to prevent and limit interception damages.
Who? What? When? How? As portals and distributed environments develop, managing 'who can access what, when,
how?' quickly becomes deep application and business logic concerns. As security and
security configuration evolve, they severely affect the application and its business
logic code, often imposing complex application modifications, as well as portal and
application re-testing and re-deploying, usually not trivial tasks, especially in
large mission critical environments.
DNAOS Security
DNAOSsupport current available authentication, authorization, encryption services, including
SSL, LDAP, certificates.DNAOSentitlement services also protect distributed virtual profiles, resources, and contents,
with unlimited granularity, network structures, and graphical distributed resource
and content entitlement and structure modeling.DNAOSare built around entitlement secure distributed application resource management services.
|