Search This Blog

Monday, January 26, 2009

Identity management is Western Europe is alive and well

What's occuring on the other side of the pond for identity management?
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Ping Identity
rule

Attention Salesforce CRM and Google Apps Users
Single Sign-On eliminates additional user passwords to Salesforce CRM and Google Apps - in turn increasing user adoption, reducing administrative costs, automating provisioning, and improving security. Sign up for more information on how Ping Identity's PingConnect can help you easily support your organization with Single Sign-On capabilities, and how to get started now with a 90-day free trial.

rule

Spotlight Story
Identity management in Western Europe is alive and well

Dave Kearns By Dave Kearns
Because I'm based in California's Silicon Valley, a long stone's throw from Oracle HQ and surrounded by dozens of identity management vendors, my view of the global marketplace can be skewed. While I try to make up for this by visiting conferences and trade shows outside the United States (I'll be at the European ID Conference in Munich this May), I do rely on readers and friends to keep me posted about things of interest in their areas. Today, we'll hear from one identity management player in Western Europe who has reported on the state of the industry there. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Heartland tries to rally industry in wake of data breach The CEO of Heartland Payment Systems is calling for the card payments industry to share security information and consider end-to-end encryption.

Monster.com reports theft of user data Monster.com is advising its users to change their passwords after data including e-mail addresses, names and phone numbers were stolen from its database.

Information security 'how not to's' It's not easy getting information security right. It is easy to get advice (often from vendors who want to sell you their semi-magic fix for all that ails you) on what you should be doing. But actually protecting your corporate or personal data turns out to be hard in the real world. Take a look at the Identity Theft Resource Center's report on what happened last year to see.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Ping Identity
rule

Attention Salesforce CRM and Google Apps Users
Single Sign-On eliminates additional user passwords to Salesforce CRM and Google Apps - in turn increasing user adoption, reducing administrative costs, automating provisioning, and improving security. Sign up for more information on how Ping Identity's PingConnect can help you easily support your organization with Single Sign-On capabilities, and how to get started now with a 90-day free trial.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.


Comparing Troubleshooting Tools.
Better understand which network and application troubleshooting tools make the most sense for your IT shop. SNMP, NetFlow and packet analysis offer trending, network forensics, and server response time measurements. Learn the pros and cons of each and how they simply are not enough on their own.
Watch this webcast now.

 

01/26/09

Today's most-read stories:

  1. Apple puts iPhone Nano and Netbook rumors to rest
  2. White House confirms: ObamaBerry is a go
  3. In Las Vegas, data center takes power, cooling to the limit
  4. Bull castration and snake eaters: the life of Dave Hitz
  5. Nortel chief flying in corporate jet as company files for bankruptcy
  6. Top 10 YouTube hacking videos
  7. Ballmer provides grim outlook as economy 'resets'
  8. First Killzone 2 reviews roll in
  9. Heartland breach raises questions about PCI standard's effectiveness
  10. Layoffs: Microsoft bent, but not broken


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: