Search This Blog

Wednesday, June 22, 2005

CA tool kit enables shared security controls to be integrated with existing apps

NETWORK WORLD NEWSLETTER: DAVE KEARNS ON IDENTITY MANAGEMENT
06/22/05
Today's focus: CA tool kit enables shared security controls to
be integrated with existing apps

Dear security.world@gmail.com,

In this issue:

* CA's eTrust Identity and Access Management Toolkit
* Links related to Identity Management
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Concord Communications
Network World Executive Guide: The Evolution of Management
Technologies

Network and systems technologies have an important new role -
helping networked systems live up to new business realities.
With growing and shifting demands, network executives are
balancing business goals with prioritizing IT projects. Read
about the 'Future of Management', 'IT Service Management',
'Managing Security', and 'Best Practices'.
http://www.fattail.com/redir/redirect.asp?CID=107038
_______________________________________________________________
TEN WAYS TO STOP SPYWARE

You will get spam down to a manageable level this year, but then
spyware will kick in. Spyware cleaners will help, but won't
eradicate all the unwanted activity at the office, at home.
Here's a ten step guide you can follow to curb the spyware
problem:
http://www.fattail.com/redir/redirect.asp?CID=106920
_______________________________________________________________

Today's focus: CA tool kit enables shared security controls to
be integrated with existing apps

By Dave Kearns

Last time out I spoke about smaller, more tightly focused,
industry events (conferences, trade shows, user group meetings,
etc.). All of that reminded me to mention something that
occurred at the Gartner IT Summit in Washington, D.C. earlier
this month. At that conference, Computer Associates announced
its eTrust Identity and Access Management (IAM) Toolkit. While
it's aimed at commercial developers, in-house programmers might
benefit more from this release.

The tool kit allows developers to integrate shared security
controls to existing applications as well as add them in to new
business applications. By using these common security controls
across all enterprise applications, an organization can leverage
standardization to ease the pain of implementing necessary IAM
procedures.

The tool kit provides a software development kit (SDK) and
additional technologies that enable developers to embed a common
set of fine-grained, identity-based security controls within
applications, according to CA. Unlike some "tool kits," it can
be implemented with a full range of third-party provisioning and
identity management tools, as well as with CA's own eTrust
security solutions, to create a comprehensive enterprise
security and identity management environment.

The eTrust IAM Toolkit facilitates writing fine-grained access
policies defined in a structured language format. These access
policies can include time-based criteria like standard working
hours and/or dynamic criteria such as customer spending limits.
Policies can execute specific actions immediately following an
authorization check, allowing business and/or security
management workflows to be driven based on
authentication/authorization results.

The tool kit also implements performance optimization by
allowing policies to be evaluated locally, minimizing external
authorization calls, and allowing authorization checks measured
at the rate of thousands per second.

To meet different auditing requirements, the eTrust IAM Toolkit
gives the user total flexibility to define what events to
capture. It thus enables them to apply a consistent audit format
across all of their applications.

There's a lot more to the toolkit, of course, and if you're at
all interested (and many of you should be) you should visit
<http://ca.com/etrust/iam_toolkit> to learn more.

Speaking of small conferences, I want to point you to a new
meeting that's just been announced to take place in conjunction
with next month's Catalyst conference in San Diego. On Tuesday,
July 12, Radiant Logic will hold its first Virtual Directory
User Meeting with presentations by users of Radiant Logic's
Virtual Directory Engine (VDE), company CEO Michel Prompt and
even a curmudgeon or two. Details and registration at
<http://www.radiantlogic.com/ns/news/Catalyst2005.shtml> and I
hope to see you there.
_______________________________________________________________
To contact: Dave Kearns

Dave Kearns is a writer and consultant in Silicon Valley. He's
written a number of books including the (sadly) now out of print
"Peter Norton's Complete Guide to Networks." His musings can be
found at Virtual Quill <http://www.vquill.com/>.

Kearns is the author of three Network World Newsletters: Windows
Networking Tips, Novell NetWare Tips, and Identity Management.
Comments about these newsletters should be sent to him at these

respective addresses: <mailto:windows@vquill.com>,
<mailto:netware@vquill.com>, <mailto:identity@vquill.com>.

Kearns provides content services to network vendors: books,
manuals, white papers, lectures and seminars, marketing,
technical marketing and support documents. Virtual Quill
provides "words to sell by..." Find out more by e-mail at
<mailto:info@vquill.com>
_______________________________________________________________
This newsletter is sponsored by Concord Communications
Network World Executive Guide: The Evolution of Management
Technologies

Network and systems technologies have an important new role -
helping networked systems live up to new business realities.
With growing and shifting demands, network executives are
balancing business goals with prioritizing IT projects. Read
about the 'Future of Management', 'IT Service Management',
'Managing Security', and 'Best Practices'.
http://www.fattail.com/redir/redirect.asp?CID=107037
_______________________________________________________________
ARCHIVE LINKS

Archive of the Identity Management newsletter:
http://www.networkworld.com/newsletters/dir/index.html
_______________________________________________________________
Fischer International

Gartner & Fischer: Leveraging the Future of Identity Management
and Compliance Gartner VP Roberta Witty and Fischer
International CTO Steve Tillery chart the future of Identity
Management and Compliance. What should every business do in
2005? What initiatives should be put on the back burner? What
technologies will finally simplify compliance and reduce cost?
http://www.fattail.com/redir/redirect.asp?CID=106819
_______________________________________________________________
FEATURED READER RESOURCE
CALL FOR ENTRIES: 2005 ENTERPRISE ALL-STAR AWARDS

Network World is looking for entries for its inaugural
Enterprise All-Star Awards program. The Enterprise All-Star
Awards will honor user organizations that demonstrate
exceptional use of network technology to further business
objectives. Network World will honor dozens of user
organizations from a wide variety of industries, based on a
technology category. Deadline: July 8. Enter today:
<http://www.networkworld.com/survey/easform.html?net>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments: