Secure virtual profiles and collaboration portals
Virtual profiles and collaboration portals are typically used by organizations that have common but often competing interests. This can create dynamic cost efficient environments for users to share and protect, their property, resources, and information.

More security
While on-line banking requires good security for some of the same reasons, virtual profile and collaboration portal applications usually also provide more functionality, depth, and volume of add, search, and retrieve data operations, as well as much more sophisticated rights and privileges configurations.

Single application example
If, for example, a vehicle on-board monitoring computer manufacturer sets up a secure fleet management portal for the trucking industry, providing each client trucking company with on-line tracking and personalized reporting on every aspect of its fleet, vehicules, operators, transactions, using real-time tracking data transmitted directly from the vehicules to the portal application and storage servers, at a very reasonable cost, and also allows the trucking client organizations to sell, rent, trade resources like vehicles, trailers, terminals, etc., as well as allow each to have its own set of web pages, meeting and chat areas, etc., also directly on the portal, security has to go very deep. Perimeter security won't suffice.

More applications
The case for security is similar when sharing medical, legal, or other virtual profiles on the Web, often retrieving record information from multiple and varied sources, anywhere, any time, dynamically, into secure virtual profiles, where everyone entitled can only access the data that each is entitled to, in any given context. Some portals may also require to concurrently support many such applications, further compounding security requirements.

Competing collaborators
Also, collaboration is efficient, for competitors as for others. Consequently, many new security issues are related to sharing and collaboration, while insuring privacy and confidentiality.

IT Security Today
Most of the computer security protection today focuses on detecting and preventing network, system, and application intrusion and malaware. Also, with authentication, authorization, and user security profiles applications can prevent access to some of their functions and operations, although preventing access to functionality is contrary to providing users with more functionality. Finally, contents can be encrypted to prevent and limit interception damages.

Who? What? When? How?
As portals and distributed environments develop, managing 'who can access what, when, how?' quickly becomes deep application and business logic concerns. As security and security configuration evolve, they severely affect the application and its business logic code, often imposing complex application modifications, as well as portal and application re-testing and re-deploying, usually not trivial tasks, especially in large mission critical environments.

DNAOS Security
DNAOS support current available authentication, authorization, encryption services, including SSL, LDAP, certificates. DNAOS entitlement services also protect distributed virtual profiles, resources, and contents, with unlimited granularity, network structures, and graphical distributed resource and content entitlement and structure modeling. DNAOS are built around entitlement secure distributed application resource management services.