Search This Blog

Wednesday, July 27, 2005

A sweep of M-Tech's ID mgmt. suite


NETWORK WORLD NEWSLETTER: DAVE KEARNS ON IDENTITY MANAGEMENT
07/27/05
Today's focus: A sweep of M-Tech's ID mgmt. suite

Dear security.world@gmail.com,

In this issue:

* What does M-Tech offer in the identity mgmt. space?
* Links related to Identity Management
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Ciena
NetworkWorld Special Report - The Adaptive WAN: The factors
driving WAN evolution

A combination of business and technology trends are changing the
demands on the enterprise WAN. This NetworkWorld Special Report
explores some of the key business and technology trends that are
driving and enabling the evolution of the enterprise WAN and how
the enterprise WAN can become adaptive to support these trends.
http://www.fattail.com/redir/redirect.asp?CID=108805
_______________________________________________________________
FREE NETWORK WORLD PRINT SUBSCRIPTIONS - SIGN UP NOW!

Security is one of the most pressing issues in all of IT, and
you need to stay on top of it. Network World delivers the
hottest security news. Network IT Executives depend upon Network
World for the information they need to keep their networks
secure! SUBSCRIBE TODAT AT:
http://www.fattail.com/redir/redirect.asp?CID=108941
_______________________________________________________________

Today's focus: A sweep of M-Tech's ID mgmt. suite

By Dave Kearns

While I was in San Diego for the Catalyst Conference earlier
this month, I kept running into Idan Shoham, CTO and co-founder
of M-Tech Technology. It could be that the weather in San Diego
was gorgeous, and Shoham lives in Calgary, Alberta (where summer
usually comes on July 7. In the afternoon.). So we both headed
to the outdoor verandah near the meeting rooms, or he may simply
have been stalking me.

In either case, Shoham wanted me to understand that M-Tech was
much more than a one- or two-product company these days. For a
number of years, M-Tech was known for its P-synch tool - a
password synchronization service that has slowly evolved to a
full-fledged password management application featuring
self-service password reset, help desk password reset and
simplified administration of other authentication factors, such
as hardware tokens and biometrics. For the past few years,
M-Tech has also offered ID-synch, an enterprise provisioning
product. Now, though, the company has gone all the way and is
offering a fairly complete identity management suite called The
M-Tech Identity Management Suite (Canadians aren't really known
for their subtlety!).

The suite consists of six apps/services - P-synch, ID-synch and
the following:

* ID-Certify - an enterprise compliance management that
  addresses the problem of identifying and removing excess access
  rights.
* ID-Access - a group management service for most platforms that
  support the concept of "groups." It enables users to browse for,
  and request access to, network directories through an intuitive
  Web-based interface. ID-Access can administer user access to
  folders, printers, distribution lists and other network
  resources.
* ID-Discover - an automated ID discovery and reconciliation
  product. It prompts users to enter their various login
  ID/password pairs into the system, and then builds a database or
  directory of user profiles.
* ID-Telephony - An enterprise password management software for
  use via the telephone. It allows users to reset their own
  passwords after authenticating to an interactive voice response
  (IVR) system.

When you browse over to the M-Tech Web site
<http://www.mtechit.com/> to learn more about these products
(and I hope you will) be sure to download a copy of Shoham's
white paper "Beyond Roles: A Practical Approach to Enterprise
User Provisioning"
<http://www.idsynch.com/docs/beyond-roles.html>.

While Role-based Access Control (RBAC) is important, too often
it seems that company's with 1,000 users want to define 1,500
roles. This paper will help you to understand the importance of
roles and their uses as well as other methods for ongoing
control of user access requirements.

The top 5: Today's most-read stories

1. 2005 Salary Survey
<http://www.networkworld.com/nldsv3879>

2. Cisco to acquire Sheer Networks for $97 million
<http://www.networkworld.com/nldsv3880>

3. Verizon joins managed security game
<http://www.networkworld.com/nldsv3881>

4. Schools battle personal data hacks
<http://www.networkworld.com/nldsv3882>

5. Help Desk: NAT firewall
<http://www.networkworld.com/nldsv3883>

Today's most forwarded story:

Verizon joins managed security game
<http://www.networkworld.com/nldsv3884>
_______________________________________________________________
To contact: Dave Kearns

Dave Kearns is a writer and consultant in Silicon Valley. He's
written a number of books including the (sadly) now out of print
"Peter Norton's Complete Guide to Networks." His musings can be
found at Virtual Quill <http://www.vquill.com/>.

Kearns is the author of three Network World Newsletters: Windows
Networking Tips, Novell NetWare Tips, and Identity Management.
Comments about these newsletters should be sent to him at these

respective addresses: <mailto:windows@vquill.com>,
<mailto:netware@vquill.com>, <mailto:identity@vquill.com>.

Kearns provides content services to network vendors: books,
manuals, white papers, lectures and seminars, marketing,
technical marketing and support documents. Virtual Quill
provides "words to sell by..." Find out more by e-mail at
<mailto:info@vquill.com>
_______________________________________________________________
This newsletter is sponsored by Ciena
NetworkWorld Special Report - The Adaptive WAN: The factors
driving WAN evolution

A combination of business and technology trends are changing the
demands on the enterprise WAN. This NetworkWorld Special Report
explores some of the key business and technology trends that are
driving and enabling the evolution of the enterprise WAN and how
the enterprise WAN can become adaptive to support these trends.
http://www.fattail.com/redir/redirect.asp?CID=108804
_______________________________________________________________
ARCHIVE LINKS

Archive of the Identity Management newsletter:
http://www.networkworld.com/newsletters/dir/index.html
_______________________________________________________________
FEATURED READER RESOURCE
SIX TIPS FOR GETTING WHAT YOU DESERVE

Before you go in for your next annual review or promotion
interview, you would be wise to consider these tips for ensuring
you've got the right stuff to move ahead. Network executives
offer advice to help you gun for that next promotion and fatten
up your paycheck. Click here:
<http://www.networkworld.com/you/2005/072505-salary-side2.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments: