Search This Blog

Wednesday, April 22, 2009

Making contextual judgments about access before authentication

Cisco TrustSec attempts to serve as, essentially, a 'triage' facility before network authentication occurs
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Why virtualization? Why now?
In this video, our speakers tackle these questions, explaining how virtualization technology has become more mainstream. Businesses are under pressure to ease management and reduce costs, while retaining and enhancing competitive advantages, such as flexibility, reliability, scalability and security. Watch now to see how virtualization can help address these demands.

rule

Spotlight Story
Making contextual judgments about access before authentication

Dave Kearns By Dave Kearns
Regular readers will know that I'm a big fan of context-based access. I like the idea of gathering as much context information as possible and using it for authentication and authorization as well as governance and entitlement. But suppose we could make contextual judgments about access even before authentication? Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

Oracle-Sun union means tough decisions on ID management Oracle will have to make some significant product decisions and integration plans to address the overlap it has with Sun in terms of identity management software, according...

Putting Context in Identity I had a wonderful time at last week's 2nd annual European Identity Conference in Munich. Martin Kuppinger and his crew at Kuppinger Cole + Partner for putting on an excellent conference, one which I highly recommend you add to your calendar for next year. I'd also like to thank the great guys who put themselves in harm's way (well, harm to their reputations) by participating in the three hour long panel sessions I moderated on the general topic of "Putting Context in Identity."

Baking security into a switch I read a little about Cisco's TrustSec architecture, and I'm wondering if it's something we should take a look at. It seems like getting more security built into a switch is a good idea, but I can't tell how realistic ...

Cisco spins out another corporate security architecture Cisco this week rolled out yet another method for securing corporate networks. Called TrustSec, the architecture is intended to determine, through policies, the role of users and devices in the network before granting access to resources. This has been practiced in applications for years, Cisco officials say, but is only now being enforced at the network level.

What Cisco TrustSec Learned From Cisco NAC Failures Cisco's TrustSec framework learned a great number of lessons from the Cisco NAC framework failures of the past. Oh and the lessons they've learned, let me count the ways.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Dell
rule

Why virtualization? Why now?
In this video, our speakers tackle these questions, explaining how virtualization technology has become more mainstream. Businesses are under pressure to ease management and reduce costs, while retaining and enhancing competitive advantages, such as flexibility, reliability, scalability and security. Watch now to see how virtualization can help address these demands.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.

 

04/22/09

Today's most-read stories:

  1. Apple iPhoneys: The 4G edition
  2. The biggest loser in Oracle-Sun deal: SAP
  3. 100 Gigabit Ethernet: Bridge to Terabit Ethernet
  4. VMware vows to overhaul data center with "cloud operating system"
  5. Why the Oracle/Sun deal is bad news for Microsoft, SQL Server
  6. Buzzblog: Oracle acquires Sun in $7.4B stunner
  7. Oracle-Sun union means tough decisions on ID management
  8. Oracle agrees to buy Sun for $7.4B
  9. Sun's MySQL could thrive under Oracle ownership, analysts say
  10. Six things that could ruin Twitter (and five that won't)
  11. Honda demos motion-assistance devices


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: