Identity ManagementThis newsletter is sponsored by Fluke NetworksNetwork World's Identity Management Newsletter, 08/01/07Make the cost of pilfering your asset higher than its value, plus other identity management newsBy Dave KearnsI learned from Trusted Network Technology’s PR guy George Robertson that, “With data costing companies $140 per lost record (Ponemon Institute) and selling well on the black market, business’ data could actually be worth more than its finances – though it typically has far fewer controls.” Interestingly enough, in a conversation I had last week with Securent’s Howard Ting, we discussed the old truism that you should make the cost of pilfering an asset higher than its value while concomitantly keeping the cost of protecting that asset below the cost of replacing it. If each record costs $140 to replace (or, rather, “make whole” including the costs of monitoring people’s credit ratings, etc.), and if an average data breach exposes 10,000 records (probably on the low side) then spending $1 million to protect those assets is actually a very good investment. Think of that the next time the entitlements management salesman gives you a presentation. Red Hat’s Pete Rowley drew my attention to a newish open source project called FreeIPA. IPA stands for Identity, Policy, Audit. According to the Web site: “Because of its vital importance and the way it is interrelated, we think identity, policy, and audit information should be open, interoperable, and manageable. Our focus is on making identity, policy, and audit easy to centrally manage for the Linux and Unix worlds. Of course, we will need to interoperate well with Windows and much more.” The goal of the first release, due in the fall, is to combine all in one package the following:
* Linux distributions (Fedora/Red Hat Enterprise Linux/CentOS) Contributions of time and effort are welcome. Finally, another project I’ve just become aware of, even as it moves into phase 2, is DAIDALOS - Designing Advanced network Interfaces for the Delivery and Administration of Location independent, Optimised personal Services. It’s an EU Framework Programme 6 Integrated Project designed to facilitate the user experience for mobile telecommunications users. In other words, it hopes to provide personalized, location-dependent services for people with cell phones. Since both personalization (attributes) and location (context) are important to an identity transaction, it’s probably good for identity-based organizations to get involved and not leave the entire definition of the system to the European telcos. Give it a look. Editor's Note: Starting Aug. 13, this newsletter will be renamed "Security: Identity Management" to better reflect the focus of the newsletter. We thank you for reading Network World newsletters!
|
Contact the author: Dave Kearns is a writer and consultant in Silicon Valley. He's written a number of books including the (sadly) now out of print "Peter Norton's Complete Guide to Networks." His musings can be found at Virtual Quill. Kearns is the author of two Network World Newsletters: Windows Networking Strategies, and Identity Management. Comments about these newsletters should be sent to him at these respective addresses: windows@vquill.com, identity@vquill.com . Kearns provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail. This newsletter is sponsored by Fluke NetworksARCHIVEArchive of the Identity Management Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment