Search This Blog

Monday, December 17, 2007

Agito working on solving the identity problem in the mobile field

Security: Identity Management Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Agito works on solving the identity problem in the mobile field

Dave Kearns By Dave Kearns
We spend a great deal of time in this newsletter discussing identity in the enterprise as well as the user-centric identity that's used for personal Web-based access. Sometimes the two even overlap, as they did in the last issue. But there's another area which - while it can involve both the enterprise as well as the individual user - is, nevertheless, a completely different platform and paradigm. That's the identity associated with the mobile networking arena. I met last week with a start-up that's addressing identity in that space, something that's been overlooked by the major players for far too long. Read full story

Dave Kearns is the editor of IdM, the Journal of Identity Management as well as a consultant to both vendors and users of IdM technologies. He's written a number of books including the (sadly) now out of print "Complete Guide to eDirectory." His other musings can be found at the Virtual Quill, an Internet publisher which provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail. Comments to this newsletter can be e-mailed to Dave here

MORE STORIESARROW


SPONSORED BY SHUNRA
rule

Get More From Your WAN
Download the latest Network World Executive Guide and get eight case studies that detail how real-world organizations are employing cutting-edge technologies to optimize their WAN. Learn about trunk expansion, MPLS and Metro Ethernet, and also get the latest testing and research the Network World Lab Alliance.

rule
RELATED NEWS:

Convenient credit = security threat
There were more than 20 major data compromises in the last three months that went almost completely unreported. Eventually we all become resigned to the fact of identity theft/loss. But I’m not giving up so easily.

IBM’s security stance: underrated or overambitious?
IBM isn’t known as a security company — even though it bought Internet Security Systems a year ago — but claims it’s trying to become a dominant player in the network security market. Will Big Blue succeed?

Linux, Unix, Mac, Windows PCs get authentication integration
Centeris, which provides cross-platform authentication via Microsoft's Active Directory, Tuesday enhanced its Likewise platform and an added open source project that will be distributed with the top Linux operating systems.

Google jumps into 700 MHz auction; Massachusetts warns seniors of data breach
Google says it intends to bid on wireless spectrum in the 700MHz band when the FCC begins auctioning the resource in late January 2008; and Massachusetts is warning 150,000 members of its Prescription Advantage insurance program that their personal ...

Data theft touches 150,000 Massachusetts seniors
The state of Massachusetts is warning 150,000 members of its Prescription Advantage insurance program that their personal information may have been snatched by an identity thief.


THE FASTEST FIREWALLS
Clear Choice Test  Crossbeam, IBM win raw performance test; Juniper scores on price.

HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

SPONSORED BY SHUNRA
rule

Get More From Your WAN
Download the latest Network World Executive Guide and get eight case studies that detail how real-world organizations are employing cutting-edge technologies to optimize their WAN. Learn about trunk expansion, MPLS and Metro Ethernet, and also get the latest testing and research the Network World Lab Alliance.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/17/07

TODAY'S MOST-READ STORIES:

  1. Xbox signal jamming WLANs
  2. Trojan robbing online bank customers
  3. '20/20' peers into 'Tank on Empty'
  4. Cisco opening up IOS
  5. Microsoft early with public virtualization beta
  6. The nine worst Microsoft products
  7. Cisco: the new software giant
  8. Open source and the corporate elephant
  9. Microsoft pulls plug on potty-mouth Santa
  10. AT&T employees, others discuss telework cuts


TOP 100 OF 2007


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security: Identity Management Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: