Search This Blog

Tuesday, January 20, 2009

Novell includes Windows CardSpace in Novell Access Manager

Novell Access Manager the first third-party implementation of Microsoft CardSpace?
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Radiant Logic
rule

Radiant Logic Key Trend: Identity Service Virtualization
From mergers & acquisitions to online community building; Directory aggregation to a complete IdP Service... Managing disparate populations and their entitlements across different data silos remains the #1 challenge in Identity Management. Join Forrester & Radiant Logic and learn how virtualization in its latest iteration has been key to the solution.

rule

Spotlight Story
Novell includes Windows CardSpace in Novell Access Manager

Dave Kearns By Dave Kearns
I haven't chatted with the folks from Novell in a while, so I was glad of the opportunity to talk with Lee Howarth, product manager for Novell's Access Manager last week about the new release - Version 3.1 - of the product. According to Novell and most of the news stories I saw about the release, the big news is that Novell Access Manager 3.1 now includes 'built-in support for WS-Federation.' Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Microsoft, Novell partnership yields identity technology Novell Monday unveiled support for a federation protocol in its identity software that represents the first fruits of its 18-month-old interoperability lab work with Microsoft as it relates to access management.

Microsoft, Novell toast anniversary with tools, support coupons Marking the two-year anniversary of their partnership, Microsoft and Novell said Wednesday they were releasing tools to help users manage and support SUSE Linux.

Microsoft Security dude says it's always the gift-giving season at Microsoft During the holiday season, Microsoft Subnet hooked up with John “JG” Chirapurath, director of marketing for the Identity & Security (I&S) unit at Microsoft, to pick his brain about some of the many new security and identity management tools coming out of Redmond.

Novell SLES 10.2 Xen offers great promise Novell's SLES 10.2 with Xen 3.2 is part of its Linux product line and typically is managed by the company's ZenWorks products and services.

Former U.S. gov't worker admits to snooping in passport files A second former employee of the U.S. Department of State has admitted to illegally accessing hundreds of electronic files containing the confidential passport records of politicians, celebrities and even his own ...

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Radiant Logic
rule

Radiant Logic Key Trend: Identity Service Virtualization
From mergers & acquisitions to online community building; Directory aggregation to a complete IdP Service... Managing disparate populations and their entitlements across different data silos remains the #1 challenge in Identity Management. Join Forrester & Radiant Logic and learn how virtualization in its latest iteration has been key to the solution.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/19/09

Today's most-read stories:

  1. Microsoft layoffs could come next week
  2. U.S. plots major upgrade to Internet router security
  3. Nortel's bankruptcy: A long time coming
  4. FAQ: What's in store for Nortel
  5. The presidential portrait goes digital
  6. Why Windows 7 will crush Linux
  7. Worm infects 1.1M Windows PCs in 24 hours
  8. Microsoft/Nortel relationship again under microscope
  9. Windows 7 on Netbooks: Does Linux stand a chance?
  10. How Obama might get his way on BlackBerry


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: