Security: Identity ManagementThis newsletter sponsored by Courion CorporationNetwork World's Security: Identity Management Newsletter, 09/26/07Digital ID World announcements: NetPro, NetVision, BioPasswordBy Dave KearnsIt’s Digital ID World week here in San Francisco, and that means lots of announcements from lots of our favorite identity product vendors, consortiums, associations and others. Over the next few issues we’ll cover the most important and/or most interesting of them, so we might just as well jump right in. Fellow Red Sox fan (that’s why she gets the top spot) and NetPro VP of Corporate Communications Christine McDermott wanted us to know that the company has released AccessManager 2.0 (an actual revision number, I might add), the latest version of its role-based access management solution for Windows. The new release further tightens security and streamlines entitlement auditing processes by detailing who has access to what within the system. Administrators can track and report on everything from access rights to provisioning activities, and - with centralized management of enterprise-wide audit settings – they also gain a new ability for reporting both current and historical data across Windows resources, including Active Directory, files, folders, shares, printers, registry, and services. Two particularly intriguing new features are:
Visit the AccessManager Web page for all the details. The guys from Utah’s NetVision are also in town and are happy to share with one and all the newest release (Version 6.0) of NV Monitor. Among the added features are real-time file system monitoring for Microsoft Windows and a new reporting console for the Identity Audit and Security Platform. Based on the tried and true NetVision global event monitoring engine (which has been continuously refined and improved over the past dozen years), the NetVision platform monitors all adds, deletes, and changes to file and folder access rights as well as access to, and modification of, sensitive files. IT administrators and auditors are able to execute reports and receive alerts detailing who has accessed or modified sensitive data. But, possibly more interesting, NVMonitor’s extensibility allows action to be taken when non-compliant file access events occur. Yes, you can close the barn door before the horses get out. Go here for more information. And finally (at least for this issue), the BioPassword team was really pleased to be able to announce Version 4.0 of its Enterprise Edition, combining all three methods of authenticating users: a combination of keystroke biometrics (something users are), knowledge-based authentication (something users know) and one-time passwords (something users have). The watchwords the company wants to use are “secure” and “inexpensive”. Keystroke biometrics means you don’t have to install biometric readers on all of your desktops – just use the keyboard that’s already there! No fingerprint readers, no passcode-generating key fobs, no smartcard readers – or anything else. You’ve already got all the hardware you need. There’s a lot more happening this week, of course, and we’ll talk about it some more in the next issue.
|
Contact the author: Dave Kearns is the editor of IdM, the Journal of Identity Management as well as a consultant to both vendors and users of IdM technologies. He's written a number of books including the (sadly) now out of print "Complete Guide to eDirectory." His other musings can be found at the Virtual Quill, an Internet publisher which provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail. Comments to this newsletter can be e-mailed to Dave here. This newsletter sponsored by Courion CorporationARCHIVEArchive of the Security: Identity Management Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment