User Centric or Contextual Aware Computing is finally starting to gain some traction partially driven by cloud computing. User Centric or Contextual Based networking is simply Adaptive Access using intelligence to dynamically change the security applied to a specific access request based on the context of that request, the resources being accessed and the policy applied between the two. The goal is to provide a unified method of applying security and delivering applications regardless of the actual security in effect, the network or the device being used to request access. It’s access security based on user, device, location and integrity both at the time of the request and the duration of access. It provides intelligence, adaptability and auditability for every user, every time. It is about the environment or conditions surrounding an event and informs us about it. With that information, we may perceive something differently which might change our view and maybe our decisions. It’s about seeing the bigger picture and making better decisions by comparing the information we have about the request along with the requirements of the application and policies in place to deliver the proper access. Garner calls this the ‘Digital Me.’
Gartner predicts that by 2012, there will be more than 7.3 billion networked devices worldwide and 298 million subscribers of location-based services. This is more than just delivering secure applications, it’s also about delivering the right resources to the right user at the right time. More than ever users are dispersed all over the globe, arriving from a multitude of devices and networks while requesting access and information from your systems. You need to offer the proper access to that user in a quick, secure and efficient manner with the proper controls. You need to make the right decisions based on that moment of information as we move from Identity (user/password with some customization) based to Contextual (Identity plus a whole lot more) based delivery models. You need to ensure that no-one is coming in or taking anything out, without context.
- #21 out of 26 Short Topics about Security
- previous stories: 20, 19, 18, 17, 16, 15, 14, 13.5, 13, 12, 11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1