News

IBM, Intel Rally for E-Business Security

IBM Corp. and Intel Corp. today announced joint efforts to promote broad industry adoption of Internet security features that work across multiple computing platforms.

As part of this effort, IBM and Intel will promote the adoption of the Common Data Security Architecture (CDSA) specification, which enables developers to create interoperable, CDSA-based applications and solutions. This effort is response to proprietary security solutions, which make interoperability an obstacle for some companies who conduct electronic business. The two companies also will conduct joint activities to educate the IT community on using CDSA in their environments.

In support of this initiative, IBM plans to ship KeyWorks, a CDSA-based product in the AIX, OS/400, and OS/390 operating systems, as well as in its IBM Vault Registry certificate management software and the IBM eNetwork Firewall for AIX and NT products. Intel plans to make selected IBM KeyWorks technologies available with its CDSA reference implementation, which will increase the interoperability of the specification. In addition, IBM plans to extend KeyWorks to take advantage of selected security capabilities planned for future Intel core silicon chips.

"To conduct e-business, companies need to know that their systems, assets and business transactions will be protected," says Al Zollar, general manager, network computing software division, IBM.

"A strong security infrastructure is critical to continue rapid growth of the Internet," says Pat Gelsinger, vice president and general manager of the desktop platforms group, Intel. "By working with IBM and other industry leaders, we will accelerate the deployment of CDSA-based solutions for secure communication, e-commerce, and development and deployment of high value Internet content."

IBM and Intel will sponsor a series of industry events designed to educate the developer and IT communities on the proposed benefits of CDSA-based products and solutions using this open architecture. The programs will include multi-vendor seminars, interoperability forums, technology development workshops, demonstrations and publication of technical documentation. (For more details on these events, see http://www.ibm.com/security and http://www.intel.com/ial/security.) --Brian Ploskina, Assistant Editor

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft Previews Windows VM Authentications via Azure Active Directory

    Microsoft on Thursday announced a preview of remote authentications into Windows-based Azure virtual machines (VMs) using Azure AD credentials.

  • Windows Server 20H1 Getting Smaller Containers and Faster PowerShell

    Microsoft is promising to deliver a smaller container size and improved PowerShell performance with its next release of Windows Server.

  • Microsoft Previews Microsoft Teams for Linux

    Microsoft on Tuesday announced a "limited preview" release of Microsoft Teams for certain Linux desktop operating systems.

  • Hyper-V Architecture: Some Clarifications

    Brien answers two thought-provoking reader questions. First, do Hyper-V VMs have direct hardware access? And second, how is it possible to monitor VM resource consumption from the host operating system?

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.