Search This Blog

Wednesday, January 28, 2009

AccessStream releases open source identity access management package

Identity management goes open source
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Radiant Logic
rule

Key Trend: Identity Service Virtualization
From mergers & acquisitions to online community building; Directory aggregation to a complete IdP Service... Managing disparate populations and their entitlements across different data silos remains the #1 challenge in Identity Management. Join Forrester & Radiant Logic and learn how virtualization in its latest iteration has been key to the solution.

rule

Spotlight Story
AccessStream releases open source identity access management package

Dave Kearns By Dave Kearns
As the new year came in, a new project was revealed to the public: an open source identity access management package from AccessStream. The package was released as a Beta 1 version but AccessStream said it should be treated as alpha code. A second release is imminent, though, so maybe it's time you took a look. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Eclipse finally delivers its Higgins open source identity framework The average gestation period for a human baby is nine months. The average gestation period for an elephant is just a tad under two years. But that's almost instantaneous when compared to a software project. Still, after ...

Venues for enterprise identity practitioners Last week's Internet Identity Workshop (IIW) was, as always, the hotbed of user-centric identity, privacy protection, open source identity and social networking data exchange. As the meeting's charter reads: "The heart ...

Eclipse, Novell near 'Big Bang' for identity Two open source identity management projects Monday said?that they had achieved a key milestone in the development of open source identity services that connect products regardless of maker or platform.

Novell details modular infrastructure plan Novell Monday laid out a technical strategy that would let users mix and match physical and virtual machines along with management tools, identity services, collaboration software, and open source operating systems.

17 High-Risk Security Threats (And How to Fix Them) Network worms. Phishing e-mail. Drive-by downloads. Data sniffed from an open wireless network. To use a computer safely in the 21st century, you have to be prepared to combat a growing number of constantly evolving security threats.
Plus:
17 High-Risk Security Threats (And How to Fix Them)
How to Stop Operating-System Attacks
How to Lock Down the Data in Your Apps
How to Safeguard Your Online Security
How to Beat Card Skimmer Scams, Other Money Drains
How to Plug Security Holes in Your Browser
How to Keep Your Cell Phone Info Private
How to Protect Your Online Passwords

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusual.

Sponsored by Radiant Logic
rule

Key Trend: Identity Service Virtualization
From mergers & acquisitions to online community building; Directory aggregation to a complete IdP Service... Managing disparate populations and their entitlements across different data silos remains the #1 challenge in Identity Management. Join Forrester & Radiant Logic and learn how virtualization in its latest iteration has been key to the solution.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/28/09

Today's most-read stories:

  1. What's the Conflicker worm got to do with NAC?
  2. HP readies for Cisco's data center assault
  3. White House e-mail crashes
  4. New Data Center: storage
  5. Downadup/Conflicker worm: When will the next shoe fall?
  6. Mobile feds: We want our BlackBerries too
  7. Windows 7: the untold story of how the enterprise gets snubbed
  8. IBM confirms layoffs
  9. iPhone to get global flat-fee voice service
  10. FAQ: How to protect your PC against the Downadup worm


Comparing Troubleshooting Tools.
Better understand which network and application troubleshooting tools make the most sense for your IT shop. SNMP, NetFlow and packet analysis offer trending, network forensics, and server response time measurements. Learn the pros and cons of each and how they simply are not enough on their own.
Watch this webcast now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: