Feature

Editor's Desk: Consolidation is in

Ezine

This article can also be found in the Premium Editorial Download "Information Security magazine: Special manager's guide: Monitoring identities."

Download it now to read this article plus other related content.

EMC's acquisition of RSA Security shows that consolidation in the security market isn't slowing down and data protection will become front and center for enterprise users.


Still wondering why EMC in late June offered $2.1 billion for RSA Security-- five times the expected annual revenues for a company whose sales were flat in 2005? EMC is willing to pay top dollar for data protection capabilities.

EMC gets encryption capability for backup and storage at a time when the theft of laptops and other physical assets is on a steady climb. Lost backup tapes alone compromised personal information of close to 7 million people since the ChoicePoint fiasco in February 2005, according to the Privacy Rights Clearinghouse. And EMC is not the first to see the synergies of security and storage management. Symantec acquired Veritas, and large infrastructure vendors such as IBM and CA have also broadened their portfolios.

But EMC also gets RSA's identity and access management, and authentication businesses--particularly hot areas, given looming Federal Financial Institution Examination Council (FFIEC) requirements that financial institutions more vigorously authenticate online banking customers. That's because while a bulk of RSA products are enterprise SecurID tokens, its acquisitions of Cyota, a provider of anti-fraud solutions to financial companies, and Passmark, which provides online banking authentication, give RSA an edge in the consumer space where banks

    Requires Free Membership to View

are scrambling to adhere to a January 2007 FFIEC deadline.

For more on the FFIEC and other forms of strong authentication, go to our Manager's Guide on Simplifying Identity Management on page 21. There you'll also get a primer on enterprise single sign-on, Web access management and federation. You'll also get advice on common pitfalls to avoid if you are rolling out an IAM solution.

You Spoke, We Listened.
Based on reader feedback, we've redesigned our Products section, which starts on page 55. We understand how busy you are and wanted to make the pages easier to read and scan.

Here's what you'll find: At the bottom of the page, we've highlighted the test methodology for the product review. We've given a grade for each of the categories in which we've tested the products, and a final verdict. We've also added coverage on managed service providers, dubbed "At Your Service," and have added an Events listing to help you plan your travel. We hope you enjoy the changes and we welcome any and all feedback.

And speaking of feedback, we're very proud of the feedback we received from the two top business publishing associations: the American Society of Business Publication Editors (ASBPE) and the Trade Association Business Publications International (TABPI). We've been honored with eight national awards and three regional awards for editorial writing and design. Meanwhile, ASBPE has named us one of the 10 finalists for Magazine of the Year from more than 100 entries.

This was first published in August 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: