Welcome!

News Feed Item

User-Managed Access Awarded 2014 Best Innovation in Information Security Award From European Identity & Cloud Conference

PISCATAWAY, NJ -- (Marketwired) -- 05/22/14 -- User-Managed Access (UMA) has won the 2014 Innovation in Information Security award from the European Identity & Cloud Conference. The UMA protocol was originally designed to help individuals control Internet data sharing and UMA's notion of authorization-as-a-service has generated the attention of modern enterprises to control access to sensitive resources in cloud and mobile environments.

Customers, citizens, employees, and partners all demand dynamic access controls in their online experiences. Developed via an open and transparent standards-based approach, UMA's flexibility toward users and enterprise authorization makes it a key business enabler innovation for the evolution business driving, and privacy respective, identity and access management. UMA has application toward a variety of growing use cases including but not limited to authorization-as-a-service for: Internet of Things, Social, HealthCare, Business Services, University, and Government.

Key to UMA's success is the core leadership team driving the project in the UMA Work Group (UMA WG) and the participation of industry-leading contributors from multiple domains around the world. Learn more about how your organization can participate or use UMA here: http://tinyurl.com/umawg

Eve Maler, UMA Chair and independent contributor says, "We're passionate about making it possible to give data-sharing power to the people, and we believe UMA's unified approach will pay off even more broadly, for enterprise security and, moving forward, even for Internet of Things security and privacy controls."

Maciej Machulak, CEO of Cloud Identity and UMA Vice-Chair, says: "Individuals are increasingly concerned about the privacy of their online data. User-Managed Access gives users back the control of their data and provides them with the insight into how this data is shared and accessed in the Cloud. The Best Innovation in Information Security in 2014 award recognizes the enormous effort of the entire work group towards providing a standard that not only puts the user first but also includes privacy principles at its core. Over the next year, UMA is likely to become even more recognizable by the industry as a modern standard for privacy-enabled applications."

Domenico Catalano, Identity Architect at Oracle Italy and User Experience Editor for UMA WG, says: "Unlocking the value of personal data in a decentralized and distributed system network requires new approaches for protection and security, accountabilities, and rights and responsibilities for managing using data. UMA provides these functions to empower the individual to make choices regarding control and access of their data."

Joni Brennan, Executive Director of Kantara Initiative, says the organization is "proud of the recognition UMA has received. With participation from industry-leaders, UMA is one of our highest-profile activities, gaining attention from around the world from innovators big and small. Kantara Initiative will continue to support UMA interoperability and adoption initiatives through our open and transparent community. We invite all interested parties to join the effort!"

About Kantara Initiative
http://kantarainitiative.org/

About the UMA WG
http://tinyurl.com/umawg

Media Contact
Joni Brennan
732 266 8994
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation