Search This Blog

Monday, January 07, 2008

Identity management in 2007: Oracle goes shopping, federation gets interoperability

Security: Identity Management Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Identity management in 2007: Oracle goes shopping, federation gets interoperability

Dave Kearns By Dave Kearns
Before getting to my predictions for this coming year in identity management, let's take a look back at 2007 - including Oracle's identity shopping spree and the efforts by industry bodies to advance convergence and interoperability - and compare those activities to our expectations. Read full story

Dave Kearns is the editor of IdM, the Journal of Identity Management as well as a consultant to both vendors and users of IdM technologies. He's written a number of books including the (sadly) now out of print "Complete Guide to eDirectory." His other musings can be found at the Virtual Quill, an Internet publisher which provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail. Comments to this newsletter can be e-mailed to Dave here

MORE STORIESARROW


SPONSORED BY MESSAGELABS
rule

Executive Guide: A look at data protection
Read this Executive Guide, "Keeping Data Safe and Found," to learn the latest news, analysis, and real-world user advice on protecting corporate data. This comprehensive Executive Guide examines technologies and methodologies, the cost of regulatory compliance and how IT professionals are juggling these issues today. Learn more today. Download this Executive Guide now.

rule
RELATED NEWS:

Personal information record losses reach new heights, 01/02/08 More than 120 million people in the U.S. had personal data exposed in 2007 as identity theft reached record heights. That's according to research from the nonprofit organization the Identity Theft Resource Center (ITRC) which reported 446 separate breaches exposing 128 million records.

Firefox hit with spoofing bug, 01/03/08 A serious flaw in how Firefox handles logons could be used by identity thieves to dupe users into disclosing passwords, a noted security researcher said Wednesday.

Webroot software offers real-time defense, 01/03/08 In today's Internet world, protecting end-user PCs from the unknown is one of the most important things you can do. No matter how a system is compromised -- be it a virus or a "drive-by" install of malicious code via a Web site -- there is no end to the amount of irritation and potential financial damage that the user or company might suffer. With most attacks zeroing in on identity theft, can you really take a chance?


EVERYTHING THAT MATTERS
Everything that Matters in IT Exploring what matters most in IT today.

TAMING THE VIRTUAL BEAST
Clear Choice Test VM management tools from Microsoft, VMware, XenSource leave room for improvement.

SPONSORED BY MESSAGELABS
rule

Executive Guide: A look at data protection
Read this Executive Guide, "Keeping Data Safe and Found," to learn the latest news, analysis, and real-world user advice on protecting corporate data. This comprehensive Executive Guide examines technologies and methodologies, the cost of regulatory compliance and how IT professionals are juggling these issues today. Learn more today. Download this Executive Guide now.

rule

Complimentary Subscriptions for IT Professionals
Sign up today and receive a yearly subscription to Network World magazine. Each week Network World is jam-packed with news, analysis, expert industry opinions and management advice that many network IT professional can't live without. Why not join them? Click here to subscribe: http://www.nww.com/PSA2_0102

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/07/08

TODAY'S MOST-READ STORIES:

  1. Cisco's virtual switch smashes records
  2. Facebook's malicious widget - 'Secret Crush'
  3. The 15 best downloads of the year
  4. Google quietly gains control of open source
  5. Is a Wi-Fi virus outbreak possible?
  6. Everything that matters in IT
  7. Eight can't-miss tech predictions for 1998
  8. Google Android faces big problems
  9. 12 IT skills that employers can't say no to
  10. Did Bell fraudulently obtain his phone patent?

FEATURED IT BUYER'S GUIDE:
VoIP Security Products


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Identity Management Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: