Wednesday, October 20, 2010

Digging deeper into user provisioning

Naysayers, get over yourselves. The cloud is secure. | Privacy? Run a background check on yourself

Network World Security: Identity Management

Forward this to a Friend >>>


Digging deeper into user provisioning
Last time out I talked a bit about Gartner Group's recent Magic Quadrant for user provisioning. I suggested you read the report, and I want to reiterate that request. Not, I hasten to add, to see who's "winning," but to better understand the whole user provisioning market in the context of the greater IdM/IAM arena. Gartner's analysts, led by Earl Perkins (research vice president in the security and privacy team) spend a large part of the report talking about provisioning itself. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WEBCAST: Bradford Networks

Step-by-Step Process to Network Security
Hear from one financial services IT pro who thought his network was completely secure until it failed an internal security audit. Tim Childress from the credit card division of Bridgestone discusses the unique approach he took to improve network security. Hear how he met his objectives to stop rogue devices, gain better network visibility. View now

Naysayers, get over yourselves. The cloud is secure.
Security fears remain a top impediment to broad adoption of public cloud servicesIf you listen to the arguments about security in the cloud they sound compelling, and generally fall into two categories: technical risks, and policy issues. Read More

Privacy? Run a background check on yourself
My company hired a new employee recently and as part of my responsibilities, I ran a basic background check for our new hire. If you've never seen a professional background check, you will most likely be shocked by the level of detail that can be gleaned from public records. Read More

FTC shoots down cyber-vultures at Google Money Tree
FTC continues assault on economic cyber-scammersThe Federal Trade Commission last year vowed to go after companies preying on what it called cyber-vultures looking to feast on consumers and businesses suffering from the down economic situation. Read More


WHITE PAPER: F5 Networks

Kerberos Constrained Delegation
F5 BIG-IP LTM with ACA in Kerberos protocol transition and constrained delegation architectures allows for a more scalable, efficient and secure infrastructure. Read now!

Facebook battles another privacy firestorm
Facebook contended that reports that the private data of users has been revealed to third part firms have been 'exaggerated.' Read More

Facebook needs to be more like Apple: Sophos
Sophos claims that 95.51 per cent of the 1,025 people it surveyed thought that Apple should have a "walled garden" approach to verifying apps. Apple vets every app that it allows into its App Store. Read More

72% of parents monitor their kid's facebook page
Nearly three quarters of parents monitor their child's social networking account, says TRUSTe. Read More


WHITE PAPER: CA

Service Assurance Defined
This Forrester paper explains the concept of service assurance and highlights how it can address fundamental issues around managing application performance and business services. Learn More

Second Wave of Adware Pounds Web Surfers
New adware companies are increasingly targeting Facebook, Twitter, and other popular social networking sites as a means of distribution. The share-friendly environment of such sites is ideal for spreading adware and trackware through third-party applications, which often hide their true intent. Read More

New Rules for Employees' Mobile Device Privacy
How CIOs should adjust their privacy policies to conform to the Supreme Court's decision on monitoring employees' text messages. Read More

Lawmakers hit Facebook CEO with privacy questions
The co-chairman of the U.S. House Bi-Partisan Privacy Caucus are seeking information on the latest report of Facebook privacy problems from CEO Mark Zuckerberg. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Seven secret weapons for network management on a budget
I am constantly looking for new open source tools that can make my life easier or allow me to assess client network environments. Here are some of my favorites, including a few lesser-known treasures.

The first Windows Phone 7 smartphones
Dell, HTC, LG and Samsung all unveiled smartphones running the Windows Phone 7 OS. In the United States, the GSM phones will be available on AT&T and T-Mobile beginning in November. (CDMA phones, such as the HTC 7 Pro on Sprint, will be available in first half of 2011.) Here's a first look at the new phones. Has Microsoft been successful with its mobile overhaul?

MOST-READ STORIES

  1. Comcast begins DNS security rollout
  2. The world's coolest data centers
  3. Bathroom tech: From strange to ridiculous
  4. New malware technique targets intrusion-prevention systems
  5. Cisco's top 10 rivals
  6. Microsoft's anti-Zeus tool cleans quarter-million PCs
  7. Is Canonical going open core? Does it matter?
  8. Top 10 specialty Web browsers you may have missed
  9. Gap between IPv4 depletion, IPv6 adoption widens
  10. HP No.2 to Cisco in Ethernet port shipments

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment