Access "Identity Management Suites Enable Integration, Interoperability"
This article is part of the May 2008 issue of Seven questions to ask before committing to SaaS
Feature-rich suites are putting a face on integration and interoperability. Compliance and consolidation are at the forefront of IT security, especially when it comes to identity and access management (IAM). Today's regulatory environment requires companies to track and control who has access to what. Meanwhile, the tools for managing that access have grown from sets of distinct products into full-blown suites. It's a result of the wave of acquisitions overtaking the IT security marketplace, with larger vendors gobbling up smaller players to broaden their security portfolios. Even companies not known as traditional players in the IAM market, like database giant Oracle, have jumped onto the playing field. And identity and access management is hot. In a study released earlier this year, Forrester Research projects the IAM market to grow from $2.6 billion in 2006 to $12.3 billion by 2014, driven largely by compliance. Forrester also notes that enterprises are shifting away from point products to integrated, feature-rich identity suites to ensure ... Access >>>
Premium Content for Free.
SaaS Offering Handles SSO
TechFocus: New Password Hell?
- Viewpoint: Let's add policy to GRC
Product review: CodeArmor 2.2 for Microsoft .NET
by Steven Weil, Contributor
The configuration, policy control and reporting capabilities of V.i. Labs' CodeArmor 2.2 for Microsoft .NET are reviewed.
Security Services: Webroot Email Security SaaS
At Your Service
Identity Management Suites Enable Integration, Interoperability
IDENTITY MANAGEMENT Feature-rich product suites are putting a face on integration and interoperability.
- SaaS Offering Handles SSO
Secure Computing SafeWord 2008 product review
Secure Computing SafeWord 2008 delivers identity management and access control for Windows systems using tokens that generate secure single-use passcodes. Information Security magazine reviews these capabilities.
7 Security Questions to Ask Your SaaS Provider
Outsourcing software as a service (SaaS) puts control over an organization's applications in the hands of others. Learn what questions to ask your provider, how to define security policies, how to understand how service providers handle security and ensure enforcement of policies.
Product review: Symantec Database Security 3.1
5 Steps for Developing Strong Change Management Program Best Practices
Poor change control and configuration management can affect the security of your systems and networks. Follow these five steps for a strong change management program.
Product review: Mandiant Intelligent Response 1.0
- Secure Computing SafeWord 2008 product review
Interview: Jim Kirkhope of NCR
PING: Jim Kirkhope
Face-Off: Is vulnerability research ethical?
Bruce Schneier and Marcus Ranum debate the ethics of vulnerability research
Reasearch on Coding Backdoors Presents Ugly Picture
Editor's Desk: Backdoor Bedlam
Security, Privacy Offices Must Combine Resources
Perspectives: Nowhere to Hide
- Interview: Jim Kirkhope of NCR
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...