View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
October 11, 2009

AmberPoint unveils new capabilities for identity propagation across multi-platform applications

Claims its new capabilities streamline access control to securely consume business services

By CBR Staff Writer

AmberPoint has unveiled new security integration capabilities for propagating identity across multi-platform composite applications, including components built on SAP NetWeaver.

The company claims that the new capabilities allows organisations to streamline access control, reduce customers time to securely consume business services and enhance the overall security of their heterogeneous applications.

AmberPoint further claims that it allows the system to know who the end user is in a distributed composite application environments by making it easy to centrally authenticate users, unifying multiple access control systems and credential types within a single enforcement point. From this point, company forwards identity onto endpoint applications and services using legacy usernames and passwords, or NetWeaver-compatible SAML tokens.

The company added that it makes composite applications running on SAP NetWeaver more trustworthy through Security Assertion Markup Language (SAML) integration and secure authentication.

Content from our partners
Rethinking cloud: challenging assumptions, learning lessons
DTX Manchester welcomes leading tech talent from across the region and beyond
The hidden complexities of deploying AI in your business

It maps credentials from other platforms, such as Windows NTLM, to SAP NetWeaver-compatible SAML tokens; ensures trustworthy transactions for SOA applications spanning multiple security domains; and complements the security framework of SAP NetWeaver in regards to authentication, access control, content filtering and message security.

AmberPoint said that it lowers the total cost of ownership for distributed applications by aggregating access control definitions within a centralised enforcement point. It minimises the impact on development, as developers don’t have to change composite applications or client applications to accommodate changes to access control. In addition, application users no longer need multiple user names and passwords.

The company added that architects and compliance officers benefit from having the same user identity across the entire system, administrators benefit by minimising the number of credentials for each user, and security administrators benefit from consistent enforcement of identity and access rights across heterogeneous environments.

Andrew Brown, director of security product marketing at AmberPoint, said: “Managing identity across distributed applications can be prohibitively difficult. Our new capabilities end the ‘chain of pain’ by making the security hurdle much easier to clear. Our customers will benefit significantly from our new identity propagation capabilities.”

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.