Search This Blog

Monday, November 01, 2010

Identity services -- anywhere and anytime

Should teachers 'friend' students on Facebook? | Banks' poor security forces 'one-in-ten' customers to switch

Network World Security: Identity Management

Forward this to a Friend >>>


Identity services -- anywhere and anytime
Last issue I waxed nostalgic about our discussions of directory services from 10 years ago, and why the directory needed to be both pervasive and ubiquitous. In today's world it's identity services -- the directory, of course, but also all of the associated authentication, authorization, governance, compliance, etc. -- that needs to be "available anywhere and every time we want to use it" as well as "available everywhere and any time we want to use it." Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: Akamai Technologies

Electronic Software Delivery
IDC : Those that are focused on providing an exceptional software acquisition are increasingly utilizing technology that helps create and measure a positive user experience. In this IDC whitepaper, review the benefits and processes of electronic software delivery. Learn the components of a successful solution that is optimal to the end user. Learn more

Should teachers 'friend' students on Facebook?
Can school teachers "friend" their students on Facebook or other social-networking sites? And can they talk critically or at all about their schools and students in public forums? Read More

Banks' poor security forces 'one-in-ten' customers to switch
Nearly one-in-ten customers have switched banks or retailers because of unhappiness over the way they have handled their identity or privacy, according to the bi-annual Unisys Security Index. Read More

IPad Enterprise Invasion and Security Risks
Enterprise IT has had no choice but to deal with iPads as they walk through the front door being carried by executives. But one mobile apps expert says the iPad wouldn't have passed last year's enterprise security requirements. Read More


WHITE PAPER: Quantum Corporation

Long-Term Data Retention – Key Considerations
Managing backup and recovery in today's environment is a multi-dimensional challenge with both near and long-term business requirements. Recent technological developments in disk backup have had a positive impact on short-term data retention strategy. This tool provides key topics to think about as you design your long-term data retention plans. Read Now

Watching orbital objects: Air Force Space Fence project moves forward
Air Force Space Fence is expected to help monitor, prevent space debrisThe Air Force this month said it was looking to award up to two preliminary design contracts worth up to a total of $214 million for development of the Space Fence which ultimately will help protect Earth by detecting Read More

What Your Business Can Learn from Russia
"Freedom" may not be a concept that's historically associated with Russia, but as for technology, the federation will soon be far freer than many businesses can even imagine--free from Windows, that is, and its legacy of high costs, malware, and perpetual hardware upgrades. Read More

Symantec writes off $10 million after faulty AV activation
Symantec has been forced to write off US$10 million in revenue after a glitch in its sales system prevented some consumers from activating their Norton antivirus software at the time they bought it. Read More


WHITE PAPER: Alcatel - Lucent

Leverage Optics and IP
Closer integration of IP and optical transport networks offers significant opportunities to reduce transport costs and increase network efficiency. Learn how key elements of the converged backbone, including support for 100G across optics and IP platforms, provide the lowest cost per bit transport. Read now.

Fighting botnets: Service rates reputation of IP addresses
Startup service provider ipTrust today said it was offering a program that lets businesses avoid botnets and infected machines by letting them know whether IP addresses are linked to suspicious behavior. Read More

Upgraded retail security standard ignores mobile payments
Version 2.0 of the Payment Card Industry Data Security Standard is being released Thursday by the PCI Security Standards Council, which acknowledges that mobile payment technologies haven't been addressed yet. Read More

IBM, European Union team to swat electronic vampires
IBM, EU Sleeper project wants to reduce impact of computer equipment in stand-by modeIBM and an number of European academic and corporate scientists  today announced a project known as Sleeper that aims to reduce the energy used by everything from mobile phones to laptops and televisions to supercomputers by 10-fold. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Hey, you with the open Wi-Fi: You're an idiot
  2. Microsoft considering encryption for Bing
  3. iMoby: the hunt for the great white iPhone
  4. Steve Jobs' business card from 1979
  5. 89,000 Microsoft employees to get a Windows Phone 7 handset
  6. Microsoft puts Windows Server instances in the cloud
  7. Nightmare robots: 20 real and creepy Androids
  8. Ubuntu moves away from GNOME
  9. Cell phone-toting time traveler exposed? Yeah right!
  10. Microsoft giving away Windows Phone 7 phones

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: