Swedish High Schools Deploy Google Cloud

Swedish High Schools Deploy Google Cloud

Many schools in Sweden have deployed secure cloud login solutions from Google.

These schools are using cloud technology from Google, online identity provider Svensk e-identitet and strong authentication company Yubico to make significant cost savings and protecting the online identity for staff and students. Online identity theft is a global concern as more e-services move to the cloud. Google notes that fraudsters have made online identity theft the fastest growing crime today. This growing concern has driven the Swedish Data Inspection Board to ask all Swedish local e-governments and schools to move from username and password login to strong two-factor authentication.
Many schools have followed the mandate and one of them is Arlandagymnasiet, which has successfully deployed secure cloud login solutions.

Google cloud services has not only simplified but also saved IT infrastructure costs.  According to a release, Svensk e-identitet provides the cloud based identity service to enable single-sign on to Google and other IT systems.

SAML is the technology used for connecting Svensk e-identitet to Google. SAML, notes the companies is an open identity standard for secure e-services, used by education and leading Internet services.

This standard is proposed to be deployed for several e-government services in Sweden during 2012.

We are very pleased with the combined Svensk e-identitet and Yubico solution. We have made significant cost savings, eliminated all administration using Google’s services, while providing superior online identity protection of our staff and students,” said Torbjorn Lundstrom, IT administrator at Arlandagymnasiet.

Elaborating on how YubiKey simplifies the process of logging in with a One-Time Password (OTP) token, Yubico says that it does not require the user to re-type long pass codes from a display device into the login field of the computer.

All users have to do is to insert the YubiKey in the USB port of any computer and get the OTP that is generated and automatically entered with a simple touch of a button on the YubiKey, without the need for any client software or drivers.

By Anuradha Shukla

Sorry, comments are closed for this post.

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…