Welcome!

Symbian Authors: Jack Newton, Kevin Benedict, Matthew Lobas, Shelly Palmer, RealWire News Distribution

Related Topics: Symbian, Java IoT, Weblogic, Linux Containers, Open Source Cloud, Cloud Security

Symbian: News Item

Sun Unveils Cloud Computing Security Tools

Sun unveiled innovative open source cloud security capabilities and announced support for the latest Security Guidance

Sun Sessions at Cloud Expo

As part of its overall strategy to help customers and partners build public and private clouds that are open and interoperable, Sun Microsystems on Thursdsay unveiled innovative open source cloud security capabilities and announced support for the latest Security Guidance from the Cloud Security Alliance.

Download Sun's CI Whitepaper Here!

Sun is steadfast in its commitment to providing best practices and technologies that help users safeguard their critical data in the enterprise and in the cloud.

The introduction of Sun's Cloud Security architectural building blocks will help deliver enterprise-grade cloud services that are highly secure, available and easily manageable when used in public, private or hybrid cloud environments.

Download GlassFish Portfolio Whitepaper

Click Here to View GlassFish 3.0 Webinar

Leveraging the built-in security capabilities of Sun's Solaris Operating Systems, including Solaris(TM) ZFS and Solaris Containers, the security tools help in securing data in transit, data at rest, and data in use in the cloud, and work with cloud offerings from leading vendors including Amazon and Eucalyptus.

Along with introducing new security tools today, Sun also announced support for the Cloud Security Alliance's “Guidance for Critical Areas of Focus in Cloud Computing – Version 2.1.” Sun privacy and security experts have been instrumental in the industry-wide effort to develop the security guidance and have been active participants in the Cloud Security Alliance since its inception. The new framework provides more concise and actionable guidance for secure adoption of cloud computing, and encompasses knowledge gained from real world deployments. For more information, visit www.cloudsecurityalliance.org/guidance.

“Sun's technologies, best practices and work with leading industry organizations like the Cloud Security Alliance help provide our customers and partners with a framework for securing data in cloud environments,” said Lew Tucker, CTO, Cloud Computing, Sun Microsystems.

Sun also published a new white paper, “Building Customer Trust in Cloud Computing with Transparent Security,” that provides an overview of transparent security and the ways in which intelligent disclosure of security design, practices and procedures can help improve customer confidence while protecting critical security features and data, improving overall governance. To download the paper, visit www.sun.com/offers/details/sun_transparency.xml.

“Security remains one of the major concerns for enterprise customers moving to the cloud,” said Glenn Brunette, Distinguished Engineer and Chief Security Architect, Sun Microsystems. “Sun's new security tools will help address several of these fundamental issues and enable customers to realize the benefits of cloud computing while also managing risk and safeguarding critical assets.”

Sun announced availability for several open source Cloud Security tools including:

-- OpenSolaris VPC Gateway: Provides customers with greater choice and flexibility when connecting their systems to the Amazon Virtual Private Cloud. The OpenSolaris VPC Gateway software enables customers to quickly and easily create a redundant, secure communications channel to a Virtual Private Cloud without the need for proprietary networking equipment. To download the OpenSolaris VPC Gateway tool, visit http://kenai.com/projects/osolvpc/pages/Home.

-- Immutable Service Containers (ISC): Delivers architectural patterns with associated deployment strategies that collectively define a highly secure foundation for service delivery. Incorporating many of the security features of the OpenSolaris Operating System, including Solaris ZFS, Solaris Containers, and Solaris IP Filter and Auditing, the ISC architecture leverages service compartmentalization and improved integration techniques to create virtual machines with significantly improved security protection and monitoring capabilities. To download the ISC software or pre-built images, visit http://kenai.com/projects/isc/pages/OpenSolaris.

-- Security Enhanced Virtual Machine Images (VMIs): Using many of the techniques developed for the Immutable Service Container project, Sun created several security-enhanced VMIs for the Amazon Elastic Compute Cloud (EC2). These virtual machines leverage industry accepted recommended practices including non-executable stacks, encrypted swap and auditing enabled by default. Beyond simple OpenSolaris images, Sun has also published integrated software stacks such as Solaris AMP and Drupal built on these security-enhanced images. To download the VMIs, visit www.sun.com/cloud/security.

-- Cloud Safety Box: Simplifies managing encrypted content in the Cloud. Using a simple Amazon S3-like interface, the Cloud Safety Box automates the compression, encryption and splitting of content being stored in the cloud on any supported operating system including Solaris, OpenSolaris, Linux and Mac OS X. To download the Cloud Safety Box, visit http://kenai.com/projects/s3-crypto/pages/Home.

Sun is working with its customers and partners worldwide to build and deploy public and private clouds that are open and interoperable. The Sun Open Cloud Platform, powered by Sun's industry-leading software, hardware and storage, delivers cost-effective, scalable cloud infrastructure.

Download CI Whitepaper Here!

More Stories By Pat Romanski

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

IoT & Smart Cities Stories
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...