PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2007

Sun Microsystems' Sun Java System Identity Manager 7.0 Product Review

IDENTITY MANAGEMENT Sun Java System Identity Manager 7.0 REVIEWED BY BRAD CAUSEY Sun Microsystems Price: $50 per user @exb @exe Sun Microsytems' latest ID management solution unifies its user provisioning and auditing products, providing an impressive level of integration and functionality in a single package. Sun Java System Identity Manager 7.0 is a complete solution that allows an enterprise to use a single console for a multitude of ID management tasks, including role delegation, password synchronization, automated provisioning and compliance auditing. Configuration/Management B   Setup was somewhat lengthy, although not difficult; a minimum installation required a dedicated server, JRE, JDK, Tomcat and MySQL. Large enterprises will need robust hardware and software components (all major databases and application servers are supported). The documentation is thorough and well written. User data sources are added via agentless connectors. Among the supported sources, which Sun calls resources, are RSA products, BlackBerry ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Product review: Six removable device control security products

    Six removable device control security products that provide centrally managed granular control over ports, interfaces and storage devices are reviewed. This review evaluates: DeviceLock 6.0 from SmartLine, Sanctuary Device Con-trol 4.0 from SecureWave, Endpoint Access Manager 3.0 from ControlGuard, Device-Wall 4.5 from Centennial Software, Safend Protector 3.1 from Safend and Protect Mobile from Workshare.

  • Prioritizing compliance and information security

    Have compliance demands refocused and weakened information security efforts?

Columns in this issue