Welcome!

News Feed Item

User-Managed Access Awarded 2014 Best Innovation in Information Security Award From European Identity & Cloud Conference

PISCATAWAY, NJ -- (Marketwired) -- 05/22/14 -- User-Managed Access (UMA) has won the 2014 Innovation in Information Security award from the European Identity & Cloud Conference. The UMA protocol was originally designed to help individuals control Internet data sharing and UMA's notion of authorization-as-a-service has generated the attention of modern enterprises to control access to sensitive resources in cloud and mobile environments.

Customers, citizens, employees, and partners all demand dynamic access controls in their online experiences. Developed via an open and transparent standards-based approach, UMA's flexibility toward users and enterprise authorization makes it a key business enabler innovation for the evolution business driving, and privacy respective, identity and access management. UMA has application toward a variety of growing use cases including but not limited to authorization-as-a-service for: Internet of Things, Social, HealthCare, Business Services, University, and Government.

Key to UMA's success is the core leadership team driving the project in the UMA Work Group (UMA WG) and the participation of industry-leading contributors from multiple domains around the world. Learn more about how your organization can participate or use UMA here: http://tinyurl.com/umawg

Eve Maler, UMA Chair and independent contributor says, "We're passionate about making it possible to give data-sharing power to the people, and we believe UMA's unified approach will pay off even more broadly, for enterprise security and, moving forward, even for Internet of Things security and privacy controls."

Maciej Machulak, CEO of Cloud Identity and UMA Vice-Chair, says: "Individuals are increasingly concerned about the privacy of their online data. User-Managed Access gives users back the control of their data and provides them with the insight into how this data is shared and accessed in the Cloud. The Best Innovation in Information Security in 2014 award recognizes the enormous effort of the entire work group towards providing a standard that not only puts the user first but also includes privacy principles at its core. Over the next year, UMA is likely to become even more recognizable by the industry as a modern standard for privacy-enabled applications."

Domenico Catalano, Identity Architect at Oracle Italy and User Experience Editor for UMA WG, says: "Unlocking the value of personal data in a decentralized and distributed system network requires new approaches for protection and security, accountabilities, and rights and responsibilities for managing using data. UMA provides these functions to empower the individual to make choices regarding control and access of their data."

Joni Brennan, Executive Director of Kantara Initiative, says the organization is "proud of the recognition UMA has received. With participation from industry-leaders, UMA is one of our highest-profile activities, gaining attention from around the world from innovators big and small. Kantara Initiative will continue to support UMA interoperability and adoption initiatives through our open and transparent community. We invite all interested parties to join the effort!"

About Kantara Initiative
http://kantarainitiative.org/

About the UMA WG
http://tinyurl.com/umawg

Media Contact
Joni Brennan
732 266 8994
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Multiple data types are pouring into IoT deployments. Data is coming in small packages as well as enormous files and data streams of many sizes. Widespread use of mobile devices adds to the total. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the tools and environments that are being put to use in IoT deployments, as well as the team skills a modern enterprise IT shop needs to keep things running, get a handle on all this data, and deli...
The age of Digital Disruption is evolving into the next era – Digital Cohesion, an age in which applications securely self-assemble and deliver predictive services that continuously adapt to user behavior. Information from devices, sensors and applications around us will drive services seamlessly across mobile and fixed devices/infrastructure. This evolution is happening now in software defined services and secure networking. Four key drivers – Performance, Economics, Interoperability and Trust ...
In recent years, containers have taken the world by storm. Companies of all sizes and industries have realized the massive benefits of containers, such as unprecedented mobility, higher hardware utilization, and increased flexibility and agility; however, many containers today are non-persistent. Containers without persistence miss out on many benefits, and in many cases simply pass the responsibility of persistence onto other infrastructure, adding additional complexity.
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Cloud Expo, Inc. has announced today that Aruna Ravichandran, vice president of DevOps Product and Solutions Marketing at CA Technologies, has been named co-conference chair of DevOps at Cloud Expo 2017. The @DevOpsSummit at Cloud Expo New York will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and @DevOpsSummit at Cloud Expo Silicon Valley will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Translating agile methodology into real-world best practices within the modern software factory has driven widespread DevOps adoption, yet much work remains to expand workflows and tooling across the enterprise. As models evolve from pockets of experimentation into wholescale organizational reinvention, practitioners find themselves challenged to incorporate the culture and architecture necessary to support DevOps at scale. In his session at @DevOpsSummit at 20th Cloud Expo, Anand Akela, Senior...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
SYS-CON Events announced today that Twistlock, the leading provider of cloud container security solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Twistlock is the industry's first enterprise security suite for container security. Twistlock's technology addresses risks on the host and within the application of the container, enabling enterprises to consistently enforce security policies, monitor...
Automation is enabling enterprises to design, deploy, and manage more complex, hybrid cloud environments. Yet the people who manage these environments must be trained in and understanding these environments better than ever before. A new era of analytics and cognitive computing is adding intelligence, but also more complexity, to these cloud environments. How smart is your cloud? How smart should it be? In this power panel at 20th Cloud Expo, moderated by Conference Chair Roger Strukhoff, pane...
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyor belt between the Software Factory and production stages. Artifacts are ...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across supply chain networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost and time for product recall as well as advance trade. Are you curious about Blockchain and how it can provide you with new opportunities for innovation and growth? In her session at 20th Cloud Exp...
@ThingsExpo has been named the Most Influential ‘Smart Cities - IIoT' Account and @BigDataExpo has been named fourteenth by Right Relevance (RR), which provides curated information and intelligence on approximately 50,000 topics. In addition, Right Relevance provides an Insights offering that combines the above Topics and Influencers information with real time conversations to provide actionable intelligence with visualizations to enable decision making. The Insights service is applicable to eve...