Unified and secure access to overcome your most-pressing challenges
Cloud Access Manager (CAM) is a web-access management solution that offers secure and unified access to all your internal and cloud-based web applications while simultaneously enhancing security and IT efficiency. CAM enables:
- Secure identity federation
- Single sign-on
- Adaptive security
- Multifactor authentication
- Simplified access control and auditing
- Scalable just-in-time cloud provisioning
- Centralized authentication, single sign-on (SSO) and attribute retrieval - Move away from dedicated application-centric directories, and the administrative burden they represent, by connecting multiple user directories and applications into a centralized authentication “hub.” Now a single login event (and password) can create a session spanning multiple web applications, hosted locally or by software-as-a-service (SaaS) vendors, as well as your own custom-built mobile applications through the OpenID Connect protocol. Applications can be integrated through a variety of technologies, including credential injection, HTTP headers and Security Assertion Markup Language (SAML) security tokens, as well as OAuth-compliant social login via Google, Microsoft Live ID, Facebook and Twitter. Using a robust, rules-based engine, Cloud Access Manager can deliver additional data about users to protected applications, for personalization or fine-grained access control.
- Multifactor Authentication -Cloud Access Manager supports multifactor authentication as both a primary source of login and for step-up authentication as dictated by risk scores generated by the Security Analytics Engine. Options for multifactor authentication include both Dell Defender on-premises and Dell Defender as a Service, SaaS-based deployment.
- Context-aware security -Explore the “who, what, when and where” for security events in your environment. The Dell Security Analytics Engine (SAE), included with CAM, gathers information from a number of sources to provide context upon which access decisions can be made and enforced, including
- Browser used – Includes historical analysis of browser use that falls outside of normal user behavior
- Geo-location pattern – Detects if an access activity originates from an abnormal location
- Specific geo-location – Prevents access initiated from specific geographies know to foster malicious activity
- Time – Detects access activities that occur outside of normal user patterns
- Blacklist – Offers a list of “forbidden” networks or network addresses
- Group membership
- Failed authentication attempt/history
- Whitelist – Offers a list of “approved” networks or network addresses
- Policy-based access control - Eliminate inconsistent, ad-hoc security and ensure that users can access only the applications they are authorized to use, based on IT-defined user roles. Roles and role membership can be assigned dynamically based on policies evaluated in real time, using existing identity data. Rules-based access control can be applied down to sub-regions of a web application, for enabling more granular authorization.
- Identity federation - Enable access scenarios that span security boundaries (cloud-based applications, multi-forest collaboration, heterogeneous platforms, partner extranets, etc.) without the need for redundant user passwords. With federation support in both Identity Provider (IdP) and Service Provider (SP) roles, Cloud Access Manager easily facilitates user access to web applications, regardless of where the users and/or the apps are located.
- Cloud access provisioning - Provision user accounts at the cloud application for federated SSO to Salesforce®, Google® Apps™ service or Microsoft® Office 365®. Cloud Access Manger centralizes access provisioning and SSO functions into a single tool, for greater IT efficiency. Just-in-time provisioning saves money by activating licenses only when access is actually used.
- Application discovery and remote access - Simplify how users find all the applications they need to get work done with Cloud Access Manager’s Application Portal. Users find an easy-to-read, role-based collection of links to the applications to which they are entitled. Through the Cloud Access Manager proxy, users can access any application from any location via a web browser.
- Access auditing - Leverage Cloud Access Manager’s role as a centralized authentication and access control solution for auditing and reporting on access events for compliance, repudiation and forensics purposes.
- SSO in virtual environments - Integration with Dell Wyse vWorkspace provides access to hosted Windows and Linux virtual desktops and applications through the Cloud Access Manager Application Portal.
PER HOST SERVER
|Operating System||Microsoft Windows Server 2008 R2 (with latest updates applied)|
Microsoft Windows Server 2008 R2 Server Core (with latest updates applied) 1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 Server Core
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012 R2 Server Core
|CPU||Min. 8 multi-core processors|
|Memory||Min. 8 GB|
|Disk space (minimum)||250 GB|
|Database Server||Microsoft SQL Server 2008 or above|
|CPU||Min.8 multi-core processors|
|Disk space (guideline, assuming typical usage)||200 MB + ~2K per user + ~2K per user per day (audit)|
|Windows Phone 7|
1Proxy host servers can run on a Windows Server Core configuration
2Supported for integrated Windows authentication
3Google Chrome version 34.0.1847.131m or above supported for integrated Windows authentication
Manage access to all your Web applications from a single portal.
Provide users a catalog of apps for which single sign-on can be enabled.
Log in to managed applications using existing social media authentication.
Securely store app credentials in a personal password wallet.
Enable single sign-on and granular access control for any SaaS application.
Form-fill single sign-on
Provides the ideal single sign-on option for web-based apps.
Use adaptive security for your evolving needs based on contextual factors.
Security Analytics Engine
Provides context for access decision enforcement.