SurePass and Microsoft Windows Azure Introduce Secure Cloud Services (SCS)

SurePass and Microsoft Team on Preventing Data Breaches

SurePass has launched a comprehensive suite of Secure Cloud Services (SCS), which run on Windows Azure. This collaboration will enable both technology providers and application developers to deploy the additional security elements needed to deliver a secure application to their clients.

SurePass is a software and hardware security company, which specializes in securing cloud-based applications. It is delivering a significant value both in cost savings and market credibility through next generation Cloud based security solutions. SurePass developed its Secure Cloud Services to run on Windows Azure and with Secure Token Services (STS), Active Directory, Forefront Threat Management Gateway (TMG), and SQL Server 2008.

The company notes that this initiative gives Microsoft customers further tools to move to the cloud in a seamless, secure and protected manner.  Elaborating further on SurePass Secure Cloud Services the company says that these services protect the front door of their customer’s network with identity verification and management.

Moreover, these services also protect the back door through data encryption, and according to SurePass this represents a significant value to their clients.

As the IT paradigm shifts to cloud based computing to meet the enterprise’s need for flexibility and cost-savings, network and identity security has become a paramount concern for all parties,” said SurePass CEO Mark Poidomani. “SurePass offers application developers and enterprises alike the opportunity to provide the added layer of security needed to prevent data breaches and identity theft to their clients as they move to the Cloud.”

By leveraging Microsoft’s identity and security capabilities and applying them to their Windows Azure-based services, SurePass gives customers a security solution that builds on the strengths of the Microsoft platform,” said Prashant Ketkar, director of product management, Windows Azure, at Microsoft.

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…