Search This Blog

Wednesday, December 12, 2007

Novell promotes the use of open source to round out identity management

Security: Identity Management Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Novell promotes the use of open source to round out identity management

Dave Kearns By Dave Kearns
Last time out, I mentioned that reputation services was part of the buzz at the recent Internet Identity Workshop. I believe that reputation services show great promise in helping to mitigate risk, which could, in turn, lead to a coalescence of user-centric and enterprise-centric identity. But there was something else that came out of a Novell session at IIW that more directly links the user-centric community with the enterprise identity domain. Read full story

Dave Kearns is the editor of IdM, the Journal of Identity Management as well as a consultant to both vendors and users of IdM technologies. He's written a number of books including the (sadly) now out of print "Complete Guide to eDirectory." His other musings can be found at the Virtual Quill, an Internet publisher which provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail. Comments to this newsletter can be e-mailed to Dave here

MORE STORIESARROW


SPONSORED BY COURION CORPORATION
rule

Developing an Enterprise IdM Program
How and where do you get started? How do you measure success? And avoid failure? Download a podcast from Courion, the provisioning and access compliance experts, featuring the keys to developing a successful identity management program - and learn how to achieve measurable business results for your organization.

rule
RELATED NEWS:

Facebook, ID fraud and the dark side of the Web, 12/11/07 In a year that has seen bullying in blogs, pedophiles on MySpace and an ongoing privacy backlash against Facebook, it was appropriate that this year's Le Web 3 conference started Tuesday with a panel discussion about the "dark side" of Web 2.0.

Lock down the data on your portable drives, 12/10/2007 Barely a week seems to go by without a headline story on the latest laptop data breach--millions of veterans' files here, thousands of medical ...

Data breaches, regulations fueling data encryption adoption, 12/10/2007 Although data encryption adds cost and complexity, business and government sectors are becoming wedded to it -- even though at times it's like an ...

Duke Law School applicants warned of possible ID theft, 12/06/07 About 1,400 Duke Law School applicants and two current students are being warned about identity theft concerns after hackers broke into the law school's Web site, where their Social Security numbers were stored in a connected database.


HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

'07 ENTERPRISE ALL-STARS
'07 ENTERPRISE ALL-STARS Honoring outstanding technology projects.

SPONSORED BY COURION CORPORATION
rule

Developing an Enterprise IdM Program
How and where do you get started? How do you measure success? And avoid failure? Download a podcast from Courion, the provisioning and access compliance experts, featuring the keys to developing a successful identity management program - and learn how to achieve measurable business results for your organization.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/12/07

TODAY'S MOST-READ STORIES:

  1. Microsoft pulls plug on potty-mouth Santa
  2. Scary tech stories
  3. Open source software targets math programs
  4. AT&T expands reach of 40G backbone
  5. Former Microsoft employee charged
  6. The nine worst Microsoft products
  7. 2007 Cool Yule Tools gift guide
  8. Net coding: networking's next revolution?
  9. Cyberattack on national labs
  10. Review: Who's got the fastest firewall?


TOP 100 OF 2007


Executive Guide The Security Treadmill

This Executive Guide offers interviews with leading, real-world security experts who tell you how to get inside users' heads, fight for a bigger security budget, and whether VoIP security issues are overstated or underrated, and much more. Review this informative guide today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Identity Management Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: