Cisco allies with industry leaders for security initiative

Cisco allies with industry leaders for security initiative

Network Security vendors, Tajalli said. This was restricted before because of encryption laws. RecoverKey is the first key recovery technology to wor...

120KB Sizes 1 Downloads 49 Views

Network Security

vendors, Tajalli said. This was restricted before because of encryption laws. RecoverKey is the first key recovery technology to work within IBM’s SecureWay Key Management Framework. The SecureWay approach promotes the coexistence and interoperability of key management systems and key recovery technologies. IBM is currently working on its own recover key technology. IBM has the right to license and distribute TIS’s RecoverKey technology its SecureWay Key within Management Framework, which it announced in December. But while it has made an agreement with TIS, IBM has not yet decided how to use this technology. “It took us a lot to get this far. It’s just now that we are starting to address those issues,” Blair said. TIS has licensed RecoverKey technology to six companies including Entrust Technologies, Hewlett-Packard and McAfee.

Cisco allies with industry leaders for security initiative Atoosa Savarnejad Now that the technology for security products is in place, it’s time to organize it in a way can managers network understand, That is the idea behind the Enterprise Security Initiative, proposed by networking giant Cisco Systems and backed by vendors such as Microsoft, Hewlett-Packard, Oracle, VeriSign and RSA Data Security. “Security is not a technology problem anymore. The technology is available. Security now is creating

8

April 7997

a consistent policy, u said Elizabeth Kaufman, product line manager for enterprise security at Cisco. Over the next 18 months, Cisco will roll out its roadmap in several stages for the new Enterprise Security Initiative. The initiative will add an additional layer to existing technology by providing a multi-technology framework. No product release dates have been set yet. It is made up of three basic principles for designing network security solutions: identity, integrity and active audit. Identity refers to the dynamic linkage of user authentication, authorization and location in the enterprise. The advantage of this is that it provides a single policy for managing security for campus, dial and firewall access. Integrity

provides

cross-product

line uniformity and data confidentiality. Active Audit enables network managers to ensure that the policy is consistent and operating correctly. Cisco will face significant competition from the likes of Checkpoint Software who has reportedly already cornered 40% of the firewall market, But Cisco hopes its approach will be different.“We are linking people, policy and infrastructures. We will do this by preserving the investment people have in their enterprise and leverage their installed technology,” Kaufman said. Cisco will use VeriSign’s Digital ID digital certificate technology and will work with Microsoft to develop a specification to tie their products together. This includes work on IPsec, a security enhancement protocol for IP networks. and

digital certificates. “Digital Certificate technology assures that a computer connected through enterprise is what it says it is and not someone trying to break into the company, nsaid Ed Mouth, manager of security marketing at Microsoft. The Digital Certificate technology is the mirror image of Microsoft’s Authenticode technology which it made public earlier this week. Based on VeriSign technology, Authenticode is a digital signature protocol which verifies the author of software programs downloaded from a server, Mr Mouth said. One analyst believes Cisco has a winning idea. “Firewalls are really the first generation security solution. People are looking for something better than firewalls and Cisco is providing them with that. A year ago, firewalls were enough. now they are not,” said Carl Howe, a senior analyst with market research firm Forrester Research in Cambridge, Massachusetts, USA. Howe said that he further believed that this initiative helped reinforce Cisco’s one-stop-shopping business model. “There are two ways of thinking: one is that users buy everything from one vendor, the second is that they buy best-of-breed products. This is one example where best-of-breed doesn’t necessarily work very well,” said Howe. Although Howe said he did not believe this would be a giant money-maker for Cisco, he did believe Cisco would have a lot to gain because of the influential vendors with which it had partnered up.

01997

Elsevier

Science

Ltd