Search This Blog

Monday, April 13, 2009

Identity management is key to the proper operation of cloud computing

The Open Cloud Manifesto deserves your support
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Avaya
rule

Effective Workers' Communications Tools
In this paper, discover the positive impact of UC on both day-to-day interactions as well as goals such as business process efficiency, customer loyalty and profitability. Explore the communications dilemmas faced by workers, management, technology teams, and organizations as a whole.

rule

Spotlight Story
Identity management is key to the proper operation of cloud computing

Dave Kearns By Dave Kearns
One of the hot buttons, or buzz phrases, these days is "cloud computing." Boiled down, it's just like client-server computing except: a) you don't own the server; b) you don't know where the server really is; and c) you may not even know where your data resides. All that aside, there remains the issues of authentication and authorization; provisioning; entitlement management; governance; compliance; risk management; single sign-on; and all of the other facets of identity management. Is anybody even thinking about those? Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Cloud computing needs better security, interoperability to live up to hype If cloud computing is to move beyond the hype cycle, vendors need to put aside their differences and agree on common principles related to security and the interoperability of cloud platforms.

Cloud computing vendors converge on standard definition, goals Cloud computing vendors are moving toward a common definition and forming industry groups to collaborate on building cloud technologies.

Author of 'cloud manifesto' surprised by Microsoft protest Microsoft's sharp criticism of an "open cloud manifesto" surprised drafters of the document, who plan to release it to the public on Monday, according to the founder of a company that helped to write it.

Microsoft criticizes drafting of secret 'Cloud Manifesto' Microsoft is criticizing the drafting of what it has characterized as a secret "Cloud Manifesto" that sets guidelines for interoperability among cloud-computing networks.

IT pros: Private clouds a good first step to cloud computing Deploying a private cloud network is a good way for enterprises to ease into cloud computing before deploying applications on the infrastructures of companies such as Amazon Web Services (AWS) and Microsoft, IT ...

Cloud Security Alliance formed to promote best practices A group calling itself the Cloud Security Alliance announced its formation Tuesday, with eBay and ING as founding members.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Avaya
rule

Effective Workers' Communications Tools
In this paper, discover the positive impact of UC on both day-to-day interactions as well as goals such as business process efficiency, customer loyalty and profitability. Explore the communications dilemmas faced by workers, management, technology teams, and organizations as a whole.

rule

Network Management Solutions in your backyard.

Answers are as close as the IT Roadmap event in your area. You can ask questions, compare quotes, and gain a year's worth of direction in less than a day. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Qualify to attend free at http://www.nww.com/rpgx.jsp?c=XU1PHB2412Z4303.

Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.

 

04/13/09

Today's most-read stories:

  1. Fearing and loathing in Windows 7
  2. Conficker, the Internet's No.1 threat, gets an update
  3. Are you an IT geezer? (and we mean that in a good way)
  4. Microsoft eating up U.S. and global netbook markets
  5. Feds join Twitter revolution
  6. How serious is threat to power grid?
  7. Report: Nokia Siemens bids for much of Nortel
  8. 10 eye-catching gadgets at CTIA
  9. EMC, VMware promise major virtualization, storage upgrades
  10. Cisco to buy Tidal Software for $105 million
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: