Welcome!

Microsoft Cloud Authors: David H Deans, Pat Romanski, Janakiram MSV, Jnan Dash, Andreas Grabner

News Feed Item

Swivel Secure améliore la flexibilité opérationnelle pour les clients et pour les partenaires commerciaux

Swivel Secure, leader mondial de la technologie d'authentification sans jeton, annonce, aujourd'hui, un certain nombre de changements opérationnels qui lui donneront une plus grande souplesse dans ses relations avec ses clients et ses partenaires commerciaux.

Modèles de tarification souples pour les revendeurs

Afin de soutenir la demande croissante du marché pour l'authentification sans jeton à proposer dans le cadre d'un service de gestion plus vaste, Swivel présente aujourd'hui un nouveau système de tarification de style utilitaire, à court terme, pour ses partenaires de distribution opérant sur ce marché. La demande pour une plus grande flexibilité dans la tarification a en partie été stimulée par le succès croissant de l'environnement de Microsoft Office 365 pour qui Swivel est le seul fournisseur agrée d'authentification sans jeton.

En alignant son contrat et les modalités de paiement sur un modèle de gestion d'entreprise de services, Swivel a permis à ses partenaires commerciaux de présenter sa plate-forme d'authentification dans leurs offres de gestion de services, sans prendre les risques liés aux contrats annuels classiques des fournisseurs. En offrant aux revendeurs des contrats flexibles à court terme et des paiements mensuels, Swivel leur permet d’en faire profiter leurs clients.

Avec cette flexibilité mensuelle de la tarification, les organismes d'utilisateurs finaux pourront adapter au mieux l’utilisation de la plate-forme de Swivel, au fur et à mesure de leurs besoins, en utilisant la combinaison de technologies adéquates pour répondre à leurs règles de sécurité et à leurs réglementations de conformité. Contrairement à d'autres fournisseurs d'authentification sans jeton qui offrent des modèles de gestion de services, Swivel offre aux entreprises la possibilité de choisir ce qu'il faut connecter en toute sécurité - Internet, VPN (virtual private network = réseau privé virtuel), nuage ou bureau - ainsi que la liberté de choisir les outils de communication utilisés pour gérer le processus : application de mobile, SMS, téléphonie ou Internet. Cette liberté évite de nombreux problèmes d'authentification rencontrés par les organisations aux prises avec la nécessité de constamment mettre à jour leurs politiques de sécurité en conformité avec la demande croissante de nouveaux dispositifs et d’applications à connecter au réseau de l'entreprise.

Plate-forme d'authentification Swivel : cycle de publication abrégé

Swivel a transformé sa plate-forme de développement et ses procédures de déploiement, en adoptant une approche agile, en abrégeant à six à huit semaines le délai entre chaque version. Cette décision simplifiera le processus de mise à niveau et accélérera la livraison aux clients de nouvelles améliorations de la plateforme.

Au lieu de gérer une mise à jour conséquente tous les six à neuf mois, le cycle de diffusion abrégé permettra également aux clients de Swivel de bénéficier de nouvelles fonctionnalités et d’autres améliorations au fur et à mesure qu’elles seront mises au point.

Dans le cadre de ce changement, la version 3.9.2 met à jour la façon dont les données de configuration sont sauvegardées sur le serveur de Swivel de sorte que, lorsqu’une nouvelle version du logiciel est diffusée, elle ne remplace pas la configuration existante, mais lit et met à jour automatiquement la configuration. Cette évolution importante réduit considérablement le temps, les ressources nécessaires et les risques associés à la mise à niveau de la plate-forme.

« Ces changements prouvent la volonté de Swivel d’introduire une plus grande mobilité et plus de flexibilité dans ses activités quotidiennes et dans sa plate-forme d'authentification, afin de rester en phase avec l'évolution du marché de l’authentification à deux facteurs », commente Chris Russell, vice-président de l'ingénierie à Swivel. « Comme Swivel continue d'accroître sa base mondiale de revendeurs, il est essentiel que nous continuions à maintenir l’efficacité de notre réseau. Nous assumons avec sérieux nos responsabilités de vendeur et nous avons adapté notre offre pour répondre aux besoins de nos partenaires et de nos clients. »

La plate-forme d'authentification de Swivel a été lancée en 2003. Elle est actuellement utilisée par des grandes entreprises mondiales, des administrations locales, des organismes nationaux de la santé et des centaines de petites entreprises, dans plus de 35 pays, pour accéder à distance à leurs réseaux d'affaires, à leurs bureaux virtuels et aux applications d’informatique en nuage. Offrant la plus large gamme d'options de déploiement pour les utilisateurs, selon Gartner, l’éminent analyste de l'industrie de la technologie de l’information, la plate-forme de Swivel permet l’utilisation d'applications mobiles, de SMS et de canaux interactifs de réponse vocale même quand une parfaite authentification à deux facteurs est requise.

- FIN -

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change the...
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
In the enterprise today, connected IoT devices are everywhere – both inside and outside corporate environments. The need to identify, manage, control and secure a quickly growing web of connections and outside devices is making the already challenging task of security even more important, and onerous. In his session at @ThingsExpo, Rich Boyer, CISO and Chief Architect for Security at NTT i3, will discuss new ways of thinking and the approaches needed to address the emerging challenges of securit...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business. Though, IoT is far more complex than most firms expected with a majority of IoT projects having failed. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, Chief IoTologist at Wipro, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology portfolios and business models to adopt and leverage IoT. He will delve in...
"I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
As cloud adoption continues to transform business, today's global enterprises are challenged with managing a growing amount of information living outside of the data center. The rapid adoption of IoT and increasingly mobile workforce are exacerbating the problem. Ensuring secure data sharing and efficient backup poses capacity and bandwidth considerations as well as policy and regulatory compliance issues.
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Linux Academy, the foremost online Linux and cloud training platform and community, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. Industry leaders in quality training, provided services, and student certification passes, its goal is to c...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
910Telecom exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and exchanges.
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and 21st International Cloud Expo, which will take place in November in Silicon Valley, California.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...