Access "Hot Pick: M-Tech Information Technology's ID-Synch 4.0"
This article is part of the January 2006 issue of How to stop data leakage
ID-Synch v4.0 M-Tech Information Technology Price: $20-$30 per user M-Tech's ID-Synch v4.0 M-Tech's ID-Synch v4.0 provides easy-to-administer automated account provisioning across multiple platforms. Manually managing user accounts in complex, heterogeneous environments is both a tremendous drain on IT resources and a significant security risk. In an era of regulatory pressure, the lack of firm, centralized control over access and authorization policies is an invitation for failed audits and government sanctions. "Ghost" accounts of terminated and transferred employees are a common and persistent security risk. M-Tech has long been one of the leaders in this market, and ID-Synch v4.0 is a robust product for easily managing large numbers of users. It guides managers through an intuitive, clean and easy-to-navigate Web interface, with connectors for more than 70 different platforms including directory services such as LDAP, Active Directory, NT Domains, Novell eDirectory and NDS, and Kerberos. Also covered are major *nix and mainframe systems, and messaging ... Access >>>
Premium Content for Free.
Recent Releases: Security product briefs, January 2006
Learn about the security products that launched in January 2006.
Authentication: TriCipher Armored Credential System v3.1.1
by Steven Weil, Contributor
TriCipher's TACS v3.1.1
Preventing Data Theft, Combating Internal Threats
Defend against internal threats and prevent information leakage and hacker attacks with several tactics such as employee monitoring, behavioral analysis tools, encryption and incident response.
Your routers and switches can yield a mother lode of security information about your network--if you know where to dig
by Dr. Juergen Schneider
This tip covers ways that you can secure a network to protect data from internal as well as external attacks.
- Recent Releases: Security product briefs, January 2006
Peak of Security
IE 7.0, Firefox, Netscape: One of these browsers comes out on top—we'll tell you which one.
Secure Reads: Security and Usability
Read a review of the book Security and Usability.
Hot Pick: M-Tech Information Technology's ID-Synch 4.0
M-Tech Information Technology's ID-Synch v4.0
Help From Above
Security managers are looking to the keepers of the Internet cloud for relief.
- Peak of Security
Perspectives: Midmarket organizations short on security budgets and respect
Industry solutions are tailored for big companies and big budgets--leaving SMBs in the dust.
Ping: Marcus Sachs
Editor's Desk: The state of patching
Party Like It's 1999?
Layer 8: Time to call a security specialist?
- Perspectives: Midmarket organizations short on security budgets and respect
More Premium Content Accessible For Free
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...