NETWORK WORLD NEWSLETTER: DAVE KEARNS ON IDENTITY MANAGEMENT
10/12/05
Today's focus: Putting ID context into context
Dear security.world@gmail.com,
In this issue:
* Webinar to learn about context
* Links related to Identity Management
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by HP
Free Whitepaper, Traffic Management; From The Network Core To
The Network Edge
Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance. Click here to
download HP's Traffic Management Whitepaper
http://www.fattail.com/redir/redirect.asp?CID=117252
_______________________________________________________________
GRID SURPRISE
Once considered a specialty technology, the latest buzz pegs
grids as great all-around application servers. Network
executives are finding that once grids are installed, they are
useful for a far wider variety of applications than just
computationally heavy ones. Are there any hitches? Click here
for more:
http://www.fattail.com/redir/redirect.asp?CID=117174
_______________________________________________________________
Today's focus: Putting ID context into context
By Dave Kearns
I'll be live and in person on your PC next week when I join
Michel Prompt, CEO and founder of Radiant Logic, for an indepth
look at how identity and virtualization can be leveraged to
deliver context-driven security. Join us on Thursday, Oct. 20 at
2 p.m. EDT (that's 11 a.m. here on the left coast, 7 p.m. UTC)
for a continuation of the conversation we began at last July's
Catalyst Conference.
Among the topics we'll be exploring are:
* Current trend and evolution in identity and directory
virtualization: from LDAP proxy to context servers.
* Typical use cases, including authentication, authorization,
access to non-directory sources and federated identity.
* Model driven identity and directory virtualization.
* Context driven security.
* Serving context with optimal performance and high
availability.
Context is emerging as one of the most important areas of both
identity management and security management. Context can
determine how an entity is perceived - its "persona," if you
will. Context is also relevant to authorization transactions -
the familiar mantra of who, what, where, when and how an attempt
to access resources is made. But context is also relevant to the
emerging discussion of personal identity, also called
"user-centric" identity <http://www.networkworld.com/nldsv8333>,
where the user can define the context in which identity
attributes are shared with others.
My part in this upcoming Webinar is to set the stage - to show
where we've come from in using context for security and to
introduce the discussion of where we're going. It promises to be
both educational and entertaining. You'll need to register
<http://www.radiantlogic.com/ns/webinar_register.shtml>, so do
that right now.
As I said, context will be at the core of identity discussions
over the near term. For one example, see Phil Windley's (he's
the author of the book "Digital Identity") comments on the
context of identity credentials
<http://www.windley.com/archives/2005/04/legislating_ide.shtml>
and how that can shape legislative activity.
Without context, things stand alone in a vacuum. As we learned
in high school physics, nature abhors a vacuum. Join me online
next week as we set the context.
The top 5: Today's most-read stories
1. Symantec AntiVirus Scan Engine has serious bug
<http://www.networkworld.com/nldsv8578>
2. Bechtel says move to IPv6 is all about business
<http://www.networkworld.com/nldsv8579>
3. You won't find this book on Oprah's list
<http://www.networkworld.com/nldsv8580>
4. IETF effort promises fewer net failures
<http://www.networkworld.com/nldsv8581>
5. The ABCs of SOA <http://www.networkworld.com/nldsv8582>
_______________________________________________________________
To contact: Dave Kearns
Dave Kearns is a writer and consultant in Silicon Valley. He's
written a number of books including the (sadly) now out of print
"Peter Norton's Complete Guide to Networks." His musings can be
found at Virtual Quill <http://www.vquill.com/>.
Kearns is the author of three Network World Newsletters: Windows
Networking Tips, Novell NetWare Tips, and Identity Management.
Comments about these newsletters should be sent to him at these
respective addresses: <mailto:windows@vquill.com>,
<mailto:netware@vquill.com>, <mailto:identity@vquill.com>.
Kearns provides content services to network vendors: books,
manuals, white papers, lectures and seminars, marketing,
technical marketing and support documents. Virtual Quill
provides "words to sell by..." Find out more by e-mail at
<mailto:info@vquill.com>
_______________________________________________________________
This newsletter is sponsored by HP
Free Whitepaper, Traffic Management; From The Network Core To
The Network Edge
Traffic management becomes critical as your network
infrastructure expands to support different types of traffic and
users. Most traffic management solutions have serious
limitations: too expensive, difficult to use, and overly taxing
on bandwidth. However ProCurve Networking by HP addresses these
requirements, overcomes the limitations of other solutions, and
gives you valuable insight into LAN performance. Click here to
download HP's Traffic Management Whitepaper
http://www.fattail.com/redir/redirect.asp?CID=117251
_______________________________________________________________
ARCHIVE LINKS
Archive of the Identity Management newsletter:
http://www.networkworld.com/newsletters/dir/index.html
_______________________________________________________________
FEATURED READER RESOURCE
Network World Technology Insider on Security: Is Encryption the
Perspective?
Encryption won't solve all your security issues but these days
there is no excuse for not safeguarding your organization's
sensitive data. From Clear Choice product coverage to new
regulations and high-profile breaches, this Technology Insider
on Security covers it all. Click here to read now:
<http://www.networkworld.com/nldsv7447>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2
International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>
To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>
Subscription questions? Contact Customer Service by replying to
this message.
This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________
Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>
Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772
For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>
Copyright Network World, Inc., 2005
1 comment:
Thank you for the info. It sounds pretty user friendly. I guess I’ll pick one up for fun. thank u
Post a Comment