Search This Blog

Monday, November 02, 2009

IdM cost justification still a hard sell

Ex--CEO of YouSendIt charged in denial of service of attack; Typewriter puts identity thieves in Federal prison
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Sophos
rule

Security Solutions
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.

Visit this site today!

rule

Spotlight Story
IdM cost justification still a hard sell

Over the years -- even going back to the Wired Windows column, the Windows Networking newsletter and the Novell newsletter -- a constant recurring theme has been justification of the costs of IT and IdM projects. No matter if it was a NOS upgrade, desktop management applications, directory services or the latest entitlement management service -- it's been a constant fight for scarce dollars with little in the way of bean counter-approved justification (i.e., profit-making ROI). Read full story

Related News:

Ex--CEO of YouSendIt charged in denial of service of attack
Well that's one way to kill your business.  The former CEO of Web 2.0 service company YouSendIt  was indicted by a federal grand jury this week with four counts of mail fraud. 

Typewriter puts identity thieves in Federal prison

12 mad science projects that could shake the world
Some science projects once only conceivable by mad scientists are now becoming more mainstream as real money is being spent on everything from shape-shifting robots to artificial intelligence-based borgs. Here we take a look at 12 projects Dr. Frankenstein would have loved. 

Lost: A $49,000 laptop computer
According to Ponemon Institute, the average cost of a lost or stolen laptop PC is more than $49,000. Most of this cost is due to the exposure of sensitive data. The sooner you discover the PC is missing and take action to disable access to the data, the less expensive the experience of the loss is.

US-CERT moves in with NCC, NCSC
The group responsible for coordinating U.S. responses to cyber threats is getting new digs.

Q&A: Don't judge Microsoft security by the number of Patch Tuesday bulletins
Don't judge Microsoft security on the number of monthly patches, says Steve Lipner, senior director of security engineering at Microsoft's Trustworthy Computing Group. Microsoft has made a lot of progress with its Security Development Lifecycle and continues to improve the process, he said.

Healthcare organizations find security, privacy cures
Healthcare organizations are energetically seeking cures for managing identity and security in fast-paced hospital environments to help physicians and nurses do their jobs more easily -- and to keep patient data safe.

HITECH Act: What you need to know about new data-breach guidelines
Healthcare providers and others handling sensitive patient data are now finding the stakes raised if they suffer a data breach because of a new law known as the "Health Information Technology for Economic and Clinical Health Act," or HITECH Act.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Protecting Your Intellectual Property
Learn about the growing threat of insider data theft, the extent to which most companies are vulnerable, and how McAfee security products enable businesses to protect their most valuable asset-their data.
Click here.


Why the Branch Office No Longer Needs IT
Is your business ready for managed services? Can you mitigate the potential risk and loss of data for access to business information and applications? What services should you consider outsourcing to a managed services provider and what can you do to mitigate the potential for loss? This webcast will address the current state of the market for branch office focused managed services and provide insights and considerations into managed services that you should be considering.
Click here to learn more.

 

November 02, 2009

MOST-READ STORIES

  1. Microsoft Linux: Why one free software advocate wants it
  2. Happy 40th birthday, Internet!
  3. Will Smart Grid power IPv6?
  4. IPhone app translates between English and Spanish, and vice-versa
  5. Verizon's Motorola Droid arrives Nov. 6
  6. Juniper's splash big on tech vision, short on specifics
  7. ICANN approves international domain names
  8. Juniper lays out the pieces of 'New Network' initiative
  9. Motorola Droid vs. Apple iPhone 3GS: finally, a contender?
  10. Growth of the China CCIE count goes negative by -9

802.11n Drives an Architectural Evolution
The sharp capacity increase possible with 802.11n is a compelling force behind the evolution in WLAN architectures. This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Learn more



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: