Identity Management

Identity Management | News, how-tos, features, reviews, and videos

Startup debuts with cloud-based open-source identity and access management software

Startup ForgeRock makes its official debut today with cloud-based open-source identity and access management (IAM) software called Open Identity Stack intended to be used by enterprises and service providers to enable centralized...

How Belo Corp. got its IAM system implemented in just six weeks

When the TV broadcasting company Belo Corp. separated from a sister company, the IT department had to build a fully functional identity and access management system in short time. Belo contracted Identity Automation to devise an...

Identity access intelligence solutions pinpoint access privilege abuse

The more things change, the more they stay the same -- at least when it comes to managing access to corporate data resources. When I started as an internal IT auditor some 20 years ago, it was a real challenge to fully understand who...

Cloud, BYOD Increases Need for Automated IAM Systems

As traditional security concepts of perimeter and end-point defense break down as a result of the proliferation of cloud services and the BYOD phenomenon, enterprises are increasingly feeling the need for greater control over access...

7 ways to mask your Internet identity

You can’t erase all of the personal info that’s out on the Web, but you hide in plain sight

Expert advice on implementing role-based access control (RBAC)

Role-based access control can improve enterprise security, reduce employee downtime and improve the efficiency of resource provisioning and access control policy administration. Here's expert advice on implementing RBAC in your...

RSA and McAfee add cloud security offerings

Cloud security options are set to widen today as RSA teams with Microsoft and Citrix to support use of RSA SecurID authentication, and separately, McAfee unveils enhancements to the McAfee Cloud Security Platform.

Who are you? Non? Anon?

Gibbs ponders anonymity. At least, it might be Gibbs ... how would you know?

Saving identity

Last issue I quoted two industry visionaries, Courion's Chris Zannetos and Netmesh's Johannes Ernst, on the troubles within the identity world -- both the enterprise side and the user-centric side. They painted a bleak picture of...

Identity problems -- speed bump or brick wall?

So far it hasn't been a great year for identity and those in the business of identity.

Peeking over the IAM horizon

Ireland's Research and Markets issued a report last month ("Business and Technology Issues in IAM") with this premise: The extended enterprise needs a comprehensive identity layer.

ZORKing Identity

When I look back to what was in the newsletter 10 years ago, as I do once a month, I frequently feel that I've been dropped into an adventure game featuring "...a maze of twisty little passages, all alike" because we never seem to be...

The government really is here to help

Back in June the U.S. government issued a draft of The National Strategy for Trusted Identities in Cyberspace. A number of good friends in the so-called user-centric identity community attended meetings where the draft was...

What does 2011 hold for identity management?

Today we’ll take one more look at some predictions for identity management and identity and access management (IAM) in the coming year.

ID management predictions from the Great White North

More predictions this issue, but we head to the great white north (Calgary) for these from Hitachi-ID's CTO, Idan Shoham. Interestingly, Idan hedges his bet with this disclaimer: "I'm more engineer than gambler, so I predict that half...

User provisioning: right access to the right people

Last issue we touched on a new definition for identity. Today I'd like to present the definitive view of the first, both historically as well as in the context of adding identity and access management (IAM) to your organization. User...

Cloud identity service gets provisioning, management

Cloud identity provider Symplified Tuesday added provisioning and management capabilities to its service platform that lets users bridge between their in-house directories and cloud-based applications.

Novell, SAP bring together security, compliance wares

Novell is integrating its security and identity software with governance, risk and compliance wares from SAP

Microsoft falls further behind on security, identity integration

Microsoft is delaying the release of Forefront Endpoint Protection 2010 until the second half of 2010. The anti-malware software had been expected to ship in the first half of the year.

Microsoft ships RC1 of new Forefront Identity Manager

Microsoft ships identity infrastructure software that will figure prominently in its plan to integrate security and identity technologies to protect clients, servers and the network edge.

Load More