Swedish High Schools Deploy Google Cloud

Swedish High Schools Deploy Google Cloud

Many schools in Sweden have deployed secure cloud login solutions from Google.

These schools are using cloud technology from Google, online identity provider Svensk e-identitet and strong authentication company Yubico to make significant cost savings and protecting the online identity for staff and students. Online identity theft is a global concern as more e-services move to the cloud. Google notes that fraudsters have made online identity theft the fastest growing crime today. This growing concern has driven the Swedish Data Inspection Board to ask all Swedish local e-governments and schools to move from username and password login to strong two-factor authentication.
Many schools have followed the mandate and one of them is Arlandagymnasiet, which has successfully deployed secure cloud login solutions.

Google cloud services has not only simplified but also saved IT infrastructure costs.  According to a release, Svensk e-identitet provides the cloud based identity service to enable single-sign on to Google and other IT systems.

SAML is the technology used for connecting Svensk e-identitet to Google. SAML, notes the companies is an open identity standard for secure e-services, used by education and leading Internet services.

This standard is proposed to be deployed for several e-government services in Sweden during 2012.

We are very pleased with the combined Svensk e-identitet and Yubico solution. We have made significant cost savings, eliminated all administration using Google’s services, while providing superior online identity protection of our staff and students,” said Torbjorn Lundstrom, IT administrator at Arlandagymnasiet.

Elaborating on how YubiKey simplifies the process of logging in with a One-Time Password (OTP) token, Yubico says that it does not require the user to re-type long pass codes from a display device into the login field of the computer.

All users have to do is to insert the YubiKey in the USB port of any computer and get the OTP that is generated and automatically entered with a simple touch of a button on the YubiKey, without the need for any client software or drivers.

By Anuradha Shukla

About CloudBuzz

Discover some of the top aggregated and curated technology news stories from around the world under the CloudBuzz authorship.

Catchup on trending stories related to Big Data, Cloud Computing, Wearable Technology, Internet of Things, Virtual Reality, Mobile Technologies and much more from some of the top information sources.

Find out more
View All Articles

Sorry, comments are closed for this post.

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud The growth of cloud based business support systems has been staggering, and while some major software houses have quickly positioned themselves as forerunners in the move to the Cloud, there are several high-flying companies that have so far failed to provide small businesses with the level…

What Agency Can Benefit The Most From IoT/CSP?

What Agency Can Benefit The Most From IoT/CSP?

What Agency Can Benefit The Most? I was recently giving a talk to some students when one of them asked me a question I hadn’t heard before. She said “How does the Internet of Things really impact the government? What agency benefits the most from IoT/CPS?” I paused for a moment, it is a great…

The Importance Of Cloud Password Management

The Importance Of Cloud Password Management

Cloud Password Management A very obvious trend over the past few years has been organizations moving their business applications to the cloud. This trend has been talked about over and over again, including the benefits, drawbacks, implementation hurdles, etc. So what is the next step or advancement in cloud hosted applications? The next step is…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

What Technology Can Displace The Password?

What Technology Can Displace The Password?

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some people might say that multi-factor authentications or ID federations will do it. It is not…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor