Access "Changing times for identity management"
This article is part of the May 2009 issue of How automated compliance solutions can help you plan for your next audit
Does it feel like the world of identity management is calcified with the same old products and a glacial pace of innovation? Strong authentication, directory services, provisioning, Web access management, and federation have been around for years but what's new? In fact, there are a lot of developments in the identity management space and newer technologies such as privileged account management, Active Directory (AD) bridge, and entitlement management are taking off as companies look to ensure security and meet compliance demands. While large enterprises have deployed a mix of identity management products, few have enjoyed the synergies that these products bring when they are integrated. Let's look at some of the benefits the new technologies provide and strategies that can help an enterprise fully leverage its identity management investments. Old School Identity Management Traditional identity management products have become an intrinsic part of the IT infrastructure and continue to be deployed today. They include: Directory services. Directory services and... Access >>>
Premium Content for Free.
Changing times for identity management
Identity management technology is adapting to meet enterprise needs. Learn what products can improve security and ease compliance.
Know when you need IDS, IPS or both
Cut through the hype and learn the differences and benefits of intrusion detection and prevention systems.
- Changing times for identity management
Cybersecurity Act of 2009: Power grab, or necessary step?
The Cybersecurity Act of 2009, also known as S.773, would give the president unprecedented authority over federal and private networks. Experts debate whether it's a power grab, or a signal of the seriousness of threats to critical infrastructure.
Ease the compliance burden with automation
Manual compliance processes are error-prone and drain corporate IT resources. Automated tools make a difference if you apply them to a well-organized compliance program.
- Cybersecurity Act of 2009: Power grab, or necessary step?
Service-focused security offers best value to organization
A service-oriented approach is the best way to demonstrate security's value and win support for security initiatives.
The Pipe Dream of No More Free Bugs
Security researchers have declared they want vendors to compensate them for their independent search for vulnerabilities.
Bruce Schneier and Marcus Ranum Face-Off: Should We Have an Expectation of Online Privacy?
by Marcus J. Ranum, Contributor
Security experts Bruce Schneier and Marcus Ranum debate whether users should have an expectation of online privacy.
- Service-focused security offers best value to organization
More Premium Content Accessible For Free
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...