SurePass and Microsoft Windows Azure Introduce Secure Cloud Services (SCS)

SurePass and Microsoft Team on Preventing Data Breaches

SurePass has launched a comprehensive suite of Secure Cloud Services (SCS), which run on Windows Azure. This collaboration will enable both technology providers and application developers to deploy the additional security elements needed to deliver a secure application to their clients.

SurePass is a software and hardware security company, which specializes in securing cloud-based applications. It is delivering a significant value both in cost savings and market credibility through next generation Cloud based security solutions. SurePass developed its Secure Cloud Services to run on Windows Azure and with Secure Token Services (STS), Active Directory, Forefront Threat Management Gateway (TMG), and SQL Server 2008.

The company notes that this initiative gives Microsoft customers further tools to move to the cloud in a seamless, secure and protected manner.  Elaborating further on SurePass Secure Cloud Services the company says that these services protect the front door of their customer’s network with identity verification and management.

Moreover, these services also protect the back door through data encryption, and according to SurePass this represents a significant value to their clients.

As the IT paradigm shifts to cloud based computing to meet the enterprise’s need for flexibility and cost-savings, network and identity security has become a paramount concern for all parties,” said SurePass CEO Mark Poidomani. “SurePass offers application developers and enterprises alike the opportunity to provide the added layer of security needed to prevent data breaches and identity theft to their clients as they move to the Cloud.”

By leveraging Microsoft’s identity and security capabilities and applying them to their Windows Azure-based services, SurePass gives customers a security solution that builds on the strengths of the Microsoft platform,” said Prashant Ketkar, director of product management, Windows Azure, at Microsoft.

By Anuradha Shukla

Sorry, comments are closed for this post.

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…