Sun Microsystems used the opening day activities of the RSA Conference 2004 in San Francisco to announce the launch of a sweeping security initiative to include all its software products, officials said Tuesday.
First to get the security treatment — which ties together authentication, identity management and risk management — is the Santa Clara, Calif., company’s Java Desktop System, an operating system
The Java Card is Sun’s authentication technology powering its new security strategy, allowing users comprehensive protection working behind the scenes.
“Security is a lifestyle, not an afterthought — it should be integrated, invisible and infinite,” Jonathan Schwartz, Sun executive vice president of software, said in a statement.
With Internet access finding its way into more devices, Sun
officials said security efforts need to break out of the PC-centric model. PDAs, cell phones and laptops all use the Internet to connect to personal information and as such need to have the same level of protection as desktops.
The Java Card is actually a reversal of the normal trend; it is deployed today in more than 500 million smart cards and mobile phones.
Out-of-the-box support for the Java Desktop System is the first in a planned rollout that will include all of Sun’s software products. With the card, users (and particularly network administrators) will be able to guarantee
the device, the people and the content sent from the desktop or mobile.
To accomplish this, Sun security developers looked at three areas to
concentrate their efforts: authentication, ID management and risk
management. Like many new systems rolling out in recent times, role-based
identity management plays a key part in strategy, with the network
partitioned to minimize damage in the case of a breach.
Sun has had an answer to two of the three “architectural pillars” officials say is necessary for infinite and invisible security — risk management and authentication.
The third, identity management is made possible from a key
acquisition by the company in November 2003 of Waveset Technologies. That company’s ID provisioning manager, password manager and identity broker provide were incorporated with Sun’s own meta directory server and identity server to build up the Java Card technology.
Steve Borcich, executive director of security marketing, told
internetnews.com companies are looking for security that works in a heterogeneous environment and encompasses all network users, from the employees to customers visiting the site to make purchases.
What’s more, that security needs to work in conjunction with the security at other companies.
“In today’s world, you have a lot of segregated islands of rights and
privileges, so you might have an account at American Airlines, and another at Bank of America,” he said. “You need to be able to set up and manage user rights and privileges across multiple applications and into targets for multiple systems.”
Working to get security to work across corporate lines involves cooperation among business entities. To do that, Sun has been working for years to bolster support for Project Liberty, an open source organization it founded to bring standardize identification management throughout the business world, called federated network identity
In November 2003, the organization entered phase two of its ID management program, which expands on identification within the company (phase one) by creating templates to use in a Web services
One immediate benefit to identity management at the company is the launch Tuesday of Waveset’s (now Sun Identity Manager) adaptors for use in a variety of software by application vendors like IBM, BEA Systems, PeopleSoft, SAP and Linux.
Like the Java Desktop System, Sun’s main target, however, is Microsoft. According to officials, Sun is offering a Microsoft adaptor for “a sharply reduced license fee.”
A key element to authentication is making sure the user signing on to the network is really who they say they are. Working with OASIS, Sun is trying to boost recognition of public key infrastructure
at IT staffs that don’t use the technology or don’t use it correctly; with the proper knowledge, which the organization will provide, officials expect PKI usage to increase.
The OASIS PKI committee conducted a survey recently and found five areas that most hinder PKI support: poor or missing support in software applications, high costs, poor understanding of PKI among senior managers and end users, interoperability problems, and lack of focus on business needs.
The action plan proposes the following:
“The committee believes that the security benefits provided by PKI can become more widely available with our proposed plan for addressing the current obstacles to deployment,” said John Sabo, PKI committee co-chair, in a statement. “We believe that following through on this action plan, which incorporates input from PKI experts and adopters, can greatly benefit those implementing emerging Web and e-business standards.”
Are large vendors such as Sun Microsystems and Microsoft really interested in improving security or is it all just marketing? Tell us what you think in our IT Management Forum.
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.