Search This Blog

Wednesday, January 09, 2008

Three predictions for identity management in 2008

Security: Identity Management Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Three predictions for identity management in 2008

Dave Kearns By Dave Kearns
What will the New Year bring in identity management? From stronger authentication combined with better validation, to convergence of federation, role-management and provisioning, to the expectation of further consolidation in the industry, here are some of my predictions for 2008. Read full story

Dave Kearns is the editor of IdM, the Journal of Identity Management as well as a consultant to both vendors and users of IdM technologies. He's written a number of books including the (sadly) now out of print "Complete Guide to eDirectory." His other musings can be found at the Virtual Quill, an Internet publisher which provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail. Comments to this newsletter can be e-mailed to Dave here

MORE STORIESARROW


SPONSORED BY SILVER PEAK
rule

Best Practices for WAN Optimization with Data Replication
Learn the keys for successful data protection across the WAN in this informative whitepaper, Best Practices for Deploying WAN Optimization with Data Replication. Get tips on how to configure these platforms and how to optimize your deployment.

rule
RELATED NEWS:

Microsoft: Flaw could lead to worm attack, 01/08/08 Microsoft has fixed a critical flaw in the Windows operating system that could be used by criminals to create a self-copying computer worm attack.

Report: IRS information security still poor, 01/08/2008 The U.S. Internal Revenue Service continues to have "pervasive" information security weaknesses that put taxpayer information at risk, and it has ...

Symantec: Gov't needs to take new cybersecurity steps, 01/07/200 8U.S. government agencies need to take additional steps to protect against cybersecurity problems after a series of congressional hearings and ...


EVERYTHING THAT MATTERS
Everything that Matters in IT Exploring what matters most in IT today.

TAMING THE VIRTUAL BEAST
Clear Choice Test VM management tools from Microsoft, VMware, XenSource leave room for improvement.

SPONSORED BY SILVER PEAK
rule

Best Practices for WAN Optimization with Data Replication
Learn the keys for successful data protection across the WAN in this informative whitepaper, Best Practices for Deploying WAN Optimization with Data Replication. Get tips on how to configure these platforms and how to optimize your deployment.

rule

Complimentary Subscriptions for IT Professionals
Sign up today and receive a yearly subscription to Network World magazine. Each week Network World is jam-packed with news, analysis, expert industry opinions and management advice that many network IT professional can't live without. Why not join them? Click here to subscribe: http://www.nww.com/PSA2_0102

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/09/08

TODAY'S MOST-READ STORIES:

  1. The IT department is dead, author argues
  2. Nugache worm kicking up a Storm
  3. Is gaming Google a gateway to crime?
  4. Top stories from the International CES
  5. Cisco's virtual switch smashes records
  6. The 15 best downloads of the year
  7. Facebook's malicious widget - 'Secret Crush'
  8. Bill Gates, Microsoft fund deep space telescope
  9. Google Android faces big problems
  10. Everything that matters in IT

MOST E-MAILED STORY:
The 15 best downloads of the year


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Identity Management Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: