News
IBM, Intel Rally for E-Business Security
- By Scott Bekker
- November 05, 1998
IBM Corp. and Intel Corp. today announced joint efforts to promote broad industry adoption of Internet security features that work across multiple computing platforms.
As part of this effort, IBM and Intel will promote the adoption of the Common Data Security Architecture (CDSA) specification, which enables developers to create interoperable, CDSA-based applications and solutions. This effort is response to proprietary security solutions, which make interoperability an obstacle for some companies who conduct electronic business. The two companies also will conduct joint activities to educate the IT community on using CDSA in their environments.
In support of this initiative, IBM plans to ship KeyWorks, a CDSA-based product in the AIX, OS/400, and OS/390 operating systems, as well as in its IBM Vault Registry certificate management software and the IBM eNetwork Firewall for AIX and NT products. Intel plans to make selected IBM KeyWorks technologies available with its CDSA reference implementation, which will increase the interoperability of the specification. In addition, IBM plans to extend KeyWorks to take advantage of selected security capabilities planned for future Intel core silicon chips.
"To conduct e-business, companies need to know that their systems, assets and business transactions will be protected," says Al Zollar, general manager, network computing software division, IBM.
"A strong security infrastructure is critical to continue rapid growth of the Internet," says Pat Gelsinger, vice president and general manager of the desktop platforms group, Intel. "By working with IBM and other industry leaders, we will accelerate the deployment of CDSA-based solutions for secure communication, e-commerce, and development and deployment of high value Internet content."
IBM and Intel will sponsor a series of industry events designed to educate the developer and IT communities on the proposed benefits of CDSA-based products and solutions using this open architecture. The programs will include multi-vendor seminars, interoperability forums, technology development workshops, demonstrations and publication of technical documentation. (For more details on these events, see http://www.ibm.com/security and http://www.intel.com/ial/security.) --Brian Ploskina, Assistant Editor
About the Author
Scott Bekker is editor in chief of Redmond Channel Partner magazine.