Wednesday, April 15, 2009

Pimp my directory

A directory service that goes beyond typical directory service offerings
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

The Cost of Securing your Database
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

Spotlight Story
Pimp my directory

Dave Kearns By Dave Kearns
A reference came in just after I'd written last month's lament about the lack of new endeavors in the realm of directory services. I put it aside, but it's worth taking a look at now. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

The other federation technology While we've seen, over the past few issues, that federated provisioning still has a long way to go there's another technology, an older technology, which might bear another look. First, though, a correction.

How a universal directory might work Provisioning across organizational boundaries using either traditional technologies or those associated with federation has been our subject the past few issues. In the last newsletter, the subject of a universal directory was mentioned. Today let's see how that might work.

The promise of provisioning Way back in the dark ages, 10 whole years ago, I first wrote about provisioning as the "killer app" for Identity Management. Actually, I called it the killer app for directory services, since the identity management tag hadn't yet been promulgated. In a piece I wrote for Novell's Web site (now, sadly, no longer available), I touted Business Layer's eProvision Employee application and talked about what was to come. Sometimes prognosticators are wrong.

Creating an identity management plan is like a game of Monopoly I was talking with Toby Weiss, from CA last week. He’s senior vice president of eTrust security management, the man responsible for the various identity management offerings from what is, arguably, the company longest in the field - at least if you trace their products lineage. We’d last spoken about 18 months ago, right after CA had acquired Netegrity. At the time, I worried that either CA’s traditional enterprise clients or Netegrity’s SMB focused clients might feel short-changed by the merger. Weiss believed that CA could successfully merge the technologies while keeping existing customers of both companies happy. As I said then, “Time will tell.” And it has.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Oracle
rule

The Cost of Securing your Database
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

Network Management Solutions in your backyard.

Answers are as close as the IT Roadmap event in your area. You can ask questions, compare quotes, and gain a year's worth of direction in less than a day. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Qualify to attend free at http://www.nww.com/rpgx.jsp?c=XU1PHB2412Z4303.


Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.

 

04/15/09

Today's most-read stories:

  1. Fact-checking the fact-checkers: Snoopes.com gets an 'A'
  2. Conficker awakens, starts scamming
  3. The Internet Kill Switch
  4. Breakthrough enables Terabit Ethernet
  5. Netbook computers spark corporate interest
  6. Twitter worm attack continues: Here's how to keep safe
  7. The 10 worst Microsoft product names of all time
  8. Microsoft eating up U.S. and global netbook markets
  9. Bill would give Obama power to shut down Internet
  10. EMC's new Symmetrix array targets virtual data centers
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment