Access "Trust Us"
This article is part of the May 2005 issue of Keeping on top of risk management and data integrity essentials
POLICY & PROCESS It doesn't come easy when you federate identity management. Living in a Federated World Federation isn't an all-or-nothing decision. It's quite common for businesses to offer limited services through a federated channel while offering full service through a directly authenticated connection. It's a classic separation-of-duties scheme. We need only look at organizations and their relationships with companies that sponsor retirement plans. A retirement plan's sponsor establishes a federation with the organization that allows employees to authenticate once to their company's network to gain access to their retirement accounts at the financial organization without the nuisance of signing in each time. Typically, the financial institution only allows the participants access to account information associated with their plans--even if they have other relationships with the institution. By limiting users' authorization based on how they are authenticated, the financial institution limits the risk that a compromise in the plan sponsor's environment ... Access >>>
Premium Content for Free.
Desktop Security: GreenBorder Enterprise Security
GreenBorder Technologies' GreenBorder Enterprise Security Solution
Snapping on SNMPv3
The ubiquitous management protocol is more secure, but upgrading isn't simple.
Hot Pick: Polivec Compliance Management System 3.7
Polivec's Polivec Compliance Management System 3.7
It doesn't come easy when you federate identity management.
SonicWALL's PRO 1260
Big Brother's Watchful Eye
Our survey finds that enterprises are spending big on management systems to meet regulatory requirements.
- Desktop Security: GreenBorder Enterprise Security
Recent Releases: Security product briefs, May 2005
Read about the information security products released in May 2005.
Keeping the Data & Oil Flowing
When ChevronTexaco puts a drill in the ground, it must live with that decision for decades. Risk management and data integrity are essential.
Secure Reads: The Art of Computer Virus Research and Defense
Read a review of The Art of Computer Virus Research and Defense.
Instant Messaging: Akonix L7 Enterprise 4.0
Akonix Systems' Akonix L7 Enterprise 4.0
Vernier Networks' EdgeWall 7000 series
- Recent Releases: Security product briefs, May 2005
Layer 8: Debating policy vs. technology
Logoff: Let's not cheapen information security certifications
Dollars & Certs
Perspectives: Windows Server 2003 security stands up
One study concludes that Windows Server 2003 is more secure than Linux.
Ping: Bruce Bonsall
MassMutual's Bruce Bonsall
Editor's Desk: Targeted malware
- Layer 8: Debating policy vs. technology
More Premium Content Accessible For Free
In this special issue, we are revealing the winners of our Security 7 awards. This is the ninth year we've handed out the Security 7 awards, which ...
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...