Identity Management

RSS
Identity Management news, solutions, and analysis for IT professionals
  • Oracle introduces Mobile Security Suite for Android and iOS

    Posted February 26, 2014 - 3:33 pm

    After acquiring mobile application management company Bitzer Mobile late last year, Oracle today announced that it has taken Bitzer's basic "container" technology for Apple ioS and Google Android and linked it to identity management.
  • Startup debuts with cloud-based open-source identity and access management software

    Posted November 14, 2012 - 2:15 pm

    Startup ForgeRock makes its official debut today with cloud-based open-source identity and access management (IAM) software called Open Identity Stack intended to be used by enterprises and service providers to enable centralized provisioning and access management to enterprise, mobile and software-as-a-service applications.
  • BYOD boon: Make identities part of the cloud OS

    Posted June 25, 2012 - 7:52 am

    Symplified's CEO will argue at an upcoming conference one way to deal with the problem: Push access management and control into the cloud
  • Hospital system pursues identity-management Holy Grail

    Posted May 20, 2012 - 7:06 am

    It's an ideal in identity management: a centralized role-based access control system that supports single-sign-on (SSO) user access to authorized applications tied into the human resources systems for automated provisioning and de-provisioning, and the ability to integrate physical-security identity badges for room access.
  • How the Red Cross found its ID management groove

    Posted January 18, 2012 - 2:57 pm

    Red Cross CISO Suzanne Hall on the organization's monster effort to overhaul security and identity management.
  • CA takes to the cloud for identity management

    Posted November 14, 2011 - 4:25 pm

    CA Technologies has gotten its feet wet with cloud-based security before, but now the company is moving further in with a package of cloud based identity and access control services.
  • Can TrueRep really protect your online reputation?

    Posted October 18, 2011 - 12:12 pm

    Yet another reputation management service strives to help you get a handle on how you look on the Web. But Intelius's TrueRep is a work in progress at best.
  • 10 identity management metrics that matter

    Posted September 29, 2011 - 11:08 am

    Within the IT security community, identity- and access-management (IAM) initiatives are considered high value, but are notoriously problematic to deploy. Yet despite IAM's complexity, it represents 30 percent or more of the total information security budget of most large institutions, according to IDC (a sister company to CSO's publisher).
  • Review

    5 cool tools for cloud management

    Posted August 8, 2011 - 11:53 am

    Cloud management tools are as varied as cloud uses. For this test, we chose five tools that each attack cloud management from a different perspective.
  • VMware releases cloud security integration tool disguised as virtual iPhone manager

    Posted May 17, 2011 - 9:36 am

    VMware's Horizon App Manager is designed to let users pull down the SAAS or internal apps they need from one screen; to do that it needs single-signon abilities nothing else does right now.
  • Obama ID protection plan may be best alternative to data theft

    Posted May 4, 2011 - 2:03 pm

    A federal program outlining how to store identity data securely and regulating the private companies that will do it may be the best option to add some protection online.
  • SailPoint takes identity management to the cloud

    Posted March 29, 2011 - 8:33 am

    SailPoint Tuesday put forward its strategy to extend the provisioning and access control capabilities of its IdentityIQ product to cloud-based environments.
  • Too much access? Privileged Identity Management can help

    Posted November 18, 2010 - 11:01 pm

    Privileged identity management (PIM) products automate control over administrative accounts, which typically put too much power in too many people's hands with too little accountability. They address the security, operational and compliance issues posed by the widely shared administrative accounts and passwords, excessive administrative rights, poor separation of duties, embedded passwords in legacy applications and scripts, and poor or nonexistent privileged-password rotation. They also provide individual accountability and an audit trail to prove that policies and controls are actually being enforced.
  • How FedEx Improved Security, Eased Access

    Posted November 3, 2010 - 8:50 pm

    By moving to an identification badge-management application, FedEx simplified its ID process from three badges to one while saving money and boosting security.
  • 10 steps to easier access management

    Posted September 14, 2010 - 1:45 pm

    NEW YORK -- A CISO who spent two years organizing identity and access management for the 15,000 users on his network boiled the whole experience down into a 10-step process he presented at the Security Standard Conference this week.
  • Identity management top security priority in Gartner survey

    Posted June 10, 2010 - 2:00 pm

    "The No.1 priority is now identity and access management,” says Gartner research director Vic Wheatman, noting the analysis is based on a close look at what IT security professionals at 308 companies are telling Gartner about their overall information spending and specific IT security projects.
  • Microsoft cranks out new identity management software

    Posted March 3, 2010 - 5:54 pm

    Microsoft announced at the RSA Conference Tuesday that it has begun shipping Forefront Identity Manager 2010, server software for provisioning and de-provisioning user access and privileges for network and database resources.
  • CA extends identity management to Salesforce.com apps

    Posted March 3, 2010 - 9:33 am

    CA Identity Manager can now be used to automate processes, such as provisioning and de-provisioning user access, for Salesforce.com’s sales forecasting application.
  • How identity governance solves the compliance challenges left by provisioning technology

    Posted February 11, 2010 - 9:39 pm

    The identity management landscape is changing. The need for stronger auditing controls is giving rise to identity governance tools that are supplanting ID provisioning solutions as the centralized management layer for identity.
  • To Err is Human, to Secure is Divine

    Posted December 8, 2009 - 3:56 pm

    With reports of insider breaches continuing to make headlines, it’s clear that organizations are still struggling to protect high value targets such as databases, key operational systems and highly sensitive information.
  • Microsoft's security, identity integration plan dragging

    Posted September 29, 2009 - 3:05 pm

    Microsoft executives say the company's ambitious plan to integrate security and identity software is progressing slower than hoped but that the foundation for the work will be set early next year.
  • Microsoft discloses ambitious security strategy

    Posted April 16, 2009 - 5:30 pm

    Microsoft Thursday began detailing a security strategy that will see it combine its identity management efforts with its Forefront security products built for clients, servers and the network edge.
  • Areas Where IT Is Still Investing

    Posted April 16, 2009 - 4:29 pm

    By Cal Slemp, Protiviti

  • Novell may make more acquisitions to fill product line

    Posted February 2, 2009 - 11:28 am

    Novell plans to use its capital to acquire companies in the areas of open-source software as well as software for data centers and identity management.
  • The security imperative

    Posted December 30, 2008 - 4:37 pm

    Leslie Lambert, vice president and chief information security officer at Sun Microsystems Inc., returned from a three-week business trip to India with a few souvenirs and a whole new set of IT security priorities. In 2009, projects like server security, metrics, application security and Web security will likely take a back seat to new data-protection measures and deeper enhancement of user-access and identity management systems. "Those are the big hitters now," she says.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question