Search This Blog

Tuesday, September 08, 2009

The shine is off directories 10 years later

Thales nShield Connect offers enterprise-class key management; How we tested key management
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Double-Take Software
rule

Thinking Beyond Tape: The Case Against Tape Backup
Many companies are already backing up their main and branch office systems to tape, but what they don't understand is just how vulnerable their data and their business remains. This video whitepaper explores the high cost, complexity and potentially dangerous shortcomings of a strategy based only on tape backup.

Learn more.

rule

Spotlight Story
The shine is off directories 10 years later

Ten years ago this week we launched the newsletter which, over time, became the one you're reading today. But back in September of 1999, "identity management" wasn't a phrase known to many people. So what Network World launched was called "Fusion Focus on Directory Services." Read full story

Related News:

Thales nShield Connect offers enterprise-class key management
Setting up the nShield to work with a new application involves getting that application to work with one of the supported key management standards, PKCS#11, Microsoft CryptoAPI/CNG, Jave JCE or OpenSSL, or with one of the other supported security protocols. This can often be somewhat complex, as these are not necessarily the native methods for encryption.

How we tested key management
The Key Management Servers were tested with standard applications on both Windows and Linux environments, using Windows 2008 with the Microsoft Certificate Authority, IIS and SQL Server 2005, and Ubuntu 9.04 with Apache 2.2.12. We tested the products by setting each up to issue keys, revoke and renew keys, monitor for correct operation, create reports and logs of activity, setting policies for issuing keys and revoking them, and looking at the granularity of management capabilities.

Encryption made easier with new key management tools
In response to dramatic and widely-publicized losses of data over the last few years, IT execs are moving to deploy encryption in every corner of the enterprise. While encryption does reduce the chances of data loss, it can also create a management nightmare, with dozens of different encryption applications using hundreds or thousands of keys.

Vormetric's agent-based approach provides strong key management across all apps
The Vormetric Data Security Expert Security Server is not a direct competitor to the Thales and Venafi systems. Rather than managing keys used by other certificate authorities or encryption solutions, it manages its own encryption solution across multiple systems.

Venafi key management software works smoothly with supported apps
Venafi Encryption Director was the easiest of the three products to deploy. There was no fiddling with server applications to apply standards-based connectors, or to install add-on encryption modules.

Microsoft Promises IIS Bug Patch
Microsoft said it is working on a patch for a bug in its popular Web server software, but experts say it's unlikely that the company will field a fix fast enough to make this week's regular Patch Tuesday release.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Closing the Risk Gap in Privileged Access Control
In this whitepaper, Enterprise Management Associates (EMA) examines this critical issue in IT security administration in light of the Symark approach to helping businesses move from a trust-based system to a secure, auditable process in order to provide a higher standard of control and better support for regulatory compliance.
Learn More


Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More

 

September 07, 2009

TOP STORIES | MOST DUGG STORIES

  1. Raytheon snaps up Internet pioneer BBN Technologies
  2. The 11 most influential microprocessors of all time
  3. Developer denies software to beat Chinese censors is malicious
  4. Cisco, EMC starting new joint venture company?
  5. Wi-Fi encryption cracked in 60 seconds
  6. Half of new servers are virtualized, survey finds
  7. 12 cool ways to donate your PC's spare processing power
  8. Still trying to crack Nazi Enigma messages
  9. Snow Leopard vs. Windows 7
  10. 12 words you can never say in the office

The Benefits of Integrated IPS
If a traditional distributed Intrusion Prevention System seems too complex then integrated IPS everywhere might be the right strategy for you. The benefits will be discussed during this Live Webcast, Thursday, September 17, 1:00 p.m. EST/10 a.m. PST. Get IPS deployment best practices and tips on selecting the right operational tools.
Register now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: