Search This Blog

Tuesday, February 17, 2009

The promise of provisioning

The move to e-provisioning for partners, clients, customers and suppliers is more difficult than first thought
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Juniper Networks
rule

Live Webcast: A Simplified Data Center
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Spotlight Story
The promise of provisioning

Dave Kearns By Dave Kearns
Way back in the dark ages, 10 whole years ago, I first wrote about provisioning as the "killer app" for Identity Management. Actually, I called it the killer app for directory services, since the identity management tag hadn't yet been promulgated. In a piece I wrote for Novell's Web site (now, sadly, no longer available), I touted Business Layer's eProvision Employee application and talked about what was to come. Sometimes prognosticators are wrong. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

E-provisioning's dirty little secret It was just four years ago, that I was strolling through "Start-up City" at NetWorld+Interop Atlanta in 1999 and stumbled across a new company, Business Layers, touting a brand new application called "eProvision Employee." I was intrigued, and I had a few minutes to kill. I fell in love. Here was the application that could finally bring directory services and identity management into the mainstream.

Provisioning/de-provisioning in the education sector I'm at the Catalyst Conference in San Diego this week - say "Hi!" if you see me wondering the halls - but the news from the show will have to wait until next week's newsletters. Today I want to finish something I touched on recently - provisioning/de-provisioning in the education sector.

School system taps Novell to control network identity The Fairfax County School District in Virginia, with more than 200 schools and 164,000 students, this week announced it will begin upgrading its legacy network provisioning and password management system with Novell's ...

Provisioning/deprovisioning problematic for a third of organizations Every time we think we've finally gotten a handle on the user provisioning/deprovisioning issue something comes along to disabuse us of that notion. In this case it's the results of a survey of attendees at last spring's Directory Experts Conference (DEC) put on by NetPro.

Provisioning for non-employees in healthcare organizations Speaking of identity and healthcare, as we were in the last issue, I sat in on a panel discussion last week on provisioning non-employees in a healthcare environment. This was just one of the many fascinating sessions at this year’s (the fifth annual) Converge conference, the user conference put on by Courion and its partners Citrix, Cyber-Ark, Encentuate, RSA, Diaphonics, HealthCast, Imprivata and Radiant Logic – fairly familiar names to readers of this newsletter.

Courion and Sun ease deployment of provisioning systems We've come a very long way in the identity provisioning field over the past eight years, a journey highlighted by two recent announcements. I'll get to those in a second.

Fischer's take on provisioning systems When I told you about Gartner's Magic Quadrant report on provisioning systems a couple of weeks ago, there were a few companies listed that haven't been discussed in this newsletter in the past. I hope to change that over the next few weeks by drawing attention to them. Today, we'll look at Fischer International.

Survey: IT pros admit to peeking inside confidential data files As long as it's just the two of us talking, you can tell me - don't you sometimes go snooping inside the storage servers? Not to be nosy, of course. But, perhaps, to see just what those disk hogs (you know, the ones who ...

The messiest part of identity management The messiest part of any job is usually the cleanup. Think about what your kitchen looks like after a festive holiday meal. Or Main Street after the horse brigade marches in the annual parade. But in the field of ...

Fischer targets identity services at service providers At the end of the last century, I touted a new technology niche: e-provisionware. That name didn't stick, but the concept of electronic provisioning did, creating the revolution in enterprise identity management that ...

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Juniper Networks
rule

Live Webcast: A Simplified Data Center
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

02/16/09

Today's most-read stories:

  1. Microsoft announces $250,000 Conflicker worm bounty
  2. Evolution of PCs, Macs, Internet, routing, cell phones, Microsoft Windows
  3. Palm pulls the plug on Palm OS, bets the future on Pre's webOS
  4. Largest coordinated ATM rip-off ever nets $9+ million
  5. Iridium calls may suffer outages from satellite crash
  6. Microsoft renames, expands free online services for higher-ed
  7. New amplifier paves way for 10Gbps wireless Web
  8. NSA identifies top 25 programming errors
  9. Rumor mill: Cisco to buy VMware?
  10. Did Borat help Cisco?


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: