Search This Blog

Wednesday, January 14, 2009

AdmitOne adds security to realtors' MLS listings

10-year-old company finds a new sector for its password security services
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by MessageLabs
rule

Blocking Spam at Least 99% of the Time
By taking a multi-layered approach to fighting spam you stand the best chances of keeping unwanted emails off your systems. Realize a 99% spam capture rate with near-zero false positives with a robust anti-spam email service. Download this whitepaper to get all of the details today.

rule

Spotlight Story
AdmitOne adds security to realtors' MLS listings

Dave Kearns By Dave Kearns
Ten years ago I wrote that fingerprint, retinal scan, facial recognition, signature analysis and even keyboard entry analysis were catching on as replacements for traditional user name and password authentication. "Catching on" may have been a bit optimistic. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Podcast: 5 Ways Employees can Sabotage Your Network With a poor economy and layoffs looming at a company, the most trusted employees can often turn and become an insider threat. Tim Connelly from Netcordia discusses five different ways that they can attack your network as a way for revenge or even profit (from data theft). (7:36)

Microsoft, Novell partnership yields identity technology Novell Monday unveiled support for a federation protocol in its identity software that represents the first fruits of its 18-month-old interoperability lab work with...

Microsoft promises integrated, identity-aware security platform In an interview with John “JG” Chirapurath, director of marketing for the Identity & Security (I&S) unit at Microsoft, he discussed Identity Lifecycle Manager 2; Forefront (Stirling); Intelligent Application Gateway SP2 and Microsoft's vision for a comprehensive, identity aware platform.

Taxpayer data at IRS remains vulnerable, GAO warns Less than three months after the Treasury Inspector General for Tax Administration reported that there were major security vulnerabilities in two crucial Internal Revenue Service systems, the IRS's security practices ...

De-commoditize a better mousetrap By now, you're probably well aware of the so-called "Halloween" memos. These are the two rather long documents purportedly prepared by Microsoft employees evaluating the risk factors of Linux vis-à-vis Microsoft's operating systems. Microsoft has acknowledged at least one of the memos as a valid internal document.

BioPassword learns how you type to provide security management In the mid-1990s, parents were eager to find software that would protect their children from the evils of the Internet. Well, they're still looking, aren't they? But one of the major applications in use was NetNanny, which claimed (and still does) to: "Stop Porn; Limit Time Spent Online; Stop Illegal File Sharing; and Protect Personal Info" (all in capitals, of course!).

Where are they now? We focused on six start-ups in our May 2007 article. Only two are still operating with the same name and the same product line.

Clock ticking for gas stations to pump up data security Lower gas prices aren't the only thing that's new at the pumps these days. Data encryption tools are also becoming part of the picture.

Verayo claims its RFID is unclonable When I heard that a relatively new company here in Silicon Valley was touting its product as an "unclonable" RFID chip, I was intrigued. So when Verayo's Vivek Khandelwal, director of marketing invited me to Palo Alto ...

Has OpenID lost its mojo? Happy New Year to all, and I do hope it's a prosperous one for you. I expect that, in general, computer application vendors won't have a great year but those in the identity sphere - especially those who can automate necessary tasks - might do quite well. Time will tell. As the year ended, though, it appeared that OpenID (for example) was on a losing streak.

Stop data leaks Yes, you can keep sensitive data from leaving your organization. Our revamped Product Guide tells you what you need to know, including 5 questions to ask data-leak protection vendors before buying.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by MessageLabs
rule

Blocking Spam at Least 99% of the Time
By taking a multi-layered approach to fighting spam you stand the best chances of keeping unwanted emails off your systems. Realize a 99% spam capture rate with near-zero false positives with a robust anti-spam email service. Download this whitepaper to get all of the details today.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits.
Find out how to make it happen today.

 

01/14/09

Today's most-read stories:

  1. Why Windows 7 will crush Linux
  2. Outlook '09
  3. Top 25 software screw-ups
  4. Sources: 'Major' layoffs at Oracle, more on the way
  5. Windows 7 beta: Complete resource center to the OS
  6. Palm Pre vs. Apple iPhone: How they stack up
  7. Apple in the enterprise: Inevitable, still not easy
  8. EMC takes the gloves off with VMware
  9. Cisco's ASR 1000 router built for 10-year tenure
  10. Windows 7 beta shows off task bar, UI goodies


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: