Welcome!

Java IoT Authors: Liz McMillan, Elizabeth White, Yeshim Deniz, Pat Romanski, Paul Simmons

News Feed Item

Probaris Announces Identity as a Service (IDaaS) Offering

New Service Offering Builds on Proven PIV and PIV-I Solution for Flexible Rapid Deployments by Federal Trading Partners, Commercial, and Public Sector Entities

PHILADELPHIA, PA -- (Marketwire) -- 07/29/11 -- Probaris has launched its Identity as a Service (IDaaS) offering to allow commercial enterprises, government agencies, and government affiliated parties to quickly and easily deploy PIV Interoperable (PIV-I) credential solutions. Deployment of strong authentication solutions based on the PIV and PIV-I standards are among the most effective means to protect networks, systems, and data. Recent high profile cyber attacks against defense contractors, federal agencies and financial institutions have raised the urgency to secure critical information and infrastructure.

Building on the Probaris ID™ Registration Authority for PIV and PIV-I, the solution makes it possible for enterprises, government agencies, and other entities to establish an authoritative identity store with mappings to even the highest possible assurance levels. The Probaris IDaaS™ solution is powered by integration of the Probaris ID™ Registration Authority with card management and certificate authorities. The offering provides an end-to-end solution for smart card and mobile credentials which can be deployed quickly and easily. Probaris IDaaS™ provides the CIO, CISO, and CSO with the ability to integrate existing identity and access management (IAM), and security components into the managed identity service, along with expert services to integrate them. And, the CFO gets a more robust, leaner, and more effective compliance framework.

Enabling the process, procedures and technology of FIPS 201, the Probaris ID™ Registration Authority provides organizations with the critical business policies and functions to consolidate their identity infrastructure into a single, secure, scalable, identity vault. With this foundation, organizations can then proceed to credentialing and access management for a wide range of tokens and applications.

The U.S. government adopted the Personal Identity Verification (PIV) standard in 2005. All federal agencies have now deployed PIV solutions and are moving toward full compliance with the standard. Millions of federal employees now carry PIV credentials and many federal agencies are now developing innovative uses of the trusted identities to secure their cyber and physical assets.

In 2009 a new standard for PIV Interoperable (PIV-I) credentials authorized commercial entities to issue similarly strong trusted identity credentials. PIV-I is intended for the vast population of commercial workers who must access federal systems in the course of their daily business, as well as, state and local governments, critical infrastructure businesses, and emergency workers.

The Federal Identity, Credentialing, and Access Management (ICAM) roadmap and guidance directs the United States government and relying parties toward a single identity framework based on the PIV standard and related publications. Many agency transactions now require PIV-I credentials for non-Federal trading partners and affiliated parties who access federal systems and facilities.

Enterprise deployment of PIV and PIV-I solutions require significant capital and technical expertise. For those unfamiliar with Public Key Infrastructure (PKI) and asymmetric cryptography, digital certificates and validation, the learning process is technical and time consuming. Probaris' IDaaS™ removes the barriers to deployment by offering the solution as a managed service. The service is backed by a team of identity subject matter experts, engineers, technicians and support staff that have been responsible for numerous deployments of PIV and PIV-I credentials and the related infrastructure and applications.

About Probaris

Probaris (www.probaris.com) is a leading provider of trusted identity software and services. The company develops and markets Probaris ID™, an end-to-end solution for issuance and verification of identities. Probaris enables consolidation of employee biometric and other identity data for registration, enrollment, issuance, and life cycle management of secure credentials. Probaris has extensive expertise in the policies, standards, technologies, and best practices required to successfully transition organizations to advanced Identity, Credentialing, and Access Management (ICAM) solutions.

Contact:
Charles Durkin
Probaris, Inc.
718 Arch Street
Philadelphia, PA 19106
Phone: 215-238-0510 x217

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
In his session at @ThingsExpo, Arvind Radhakrishnen discussed how IoT offers new business models in banking and financial services organizations with the capability to revolutionize products, payments, channels, business processes and asset management built on strong architectural foundation. The following topics were covered: How IoT stands to impact various business parameters including customer experience, cost and risk management within BFS organizations.
Here are the Top 20 Twitter Influencers of the month as determined by the Kcore algorithm, in a range of current topics of interest from #IoT to #DeepLearning. To run a real-time search of a given term in our website and see the current top influencers, click on the topic name. Among the top 20 IoT influencers, ThingsEXPO ranked #14 and CloudEXPO ranked #17.
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
In his session at Cloud Expo, Alan Winters, U.S. Head of Business Development at MobiDev, presented a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to maximize project result...
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abilit...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
Recently, REAN Cloud built a digital concierge for a North Carolina hospital that had observed that most patient call button questions were repetitive. In addition, the paper-based process used to measure patient health metrics was laborious, not in real-time and sometimes error-prone. In their session at 21st Cloud Expo, Sean Finnerty, Executive Director, Practice Lead, Health Care & Life Science at REAN Cloud, and Dr. S.P.T. Krishnan, Principal Architect at REAN Cloud, discussed how they built...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.