HOME EVENTS RESOURCES NEWSLETTERS IDENTORATI HELP WANTED

A Journal of
Identity Management


Departments

Home
Events
Help Wanted

Resources
Identorati
Newsletter archive (Network World)

Recently Added Resources

A Guide to Claims-Based Identity and Access Control (2nd Edition)
White Paper
TOPIC: Entitlement management
Written/presented by: David Crawford
This is the second edition of this popular guide. It has been extensively updated to include new features and changes to the underlying technologies; and extends the coverage to encompass Windows Azure® Access Control Service, REST-based service authentication, and the use of claims-based authentication in Microsoft SharePoint® 2010.
SPONSOR: Microsoft


Are Privileged Passwords Your Weakest Link?
White Paper
TOPIC: Password management
Written/presented by:
This whitepaper helps explain the role of Password Management as it pertains to a larger Identity Access management strategy. The concepts presented in the paper serve as an overview of potential security vulnerabilities and implementation challenges that an IT Pro might face while attempting to manage privileged passwords. Also, the paper highlights ineffective and potentially dangerous password management strategies while outlining the key concepts of a more successful model.
SPONSOR: Thycotic Software


Next Generation Provisioning
Webinar
TOPIC: eProvisioning
Written/presented by: Paul Trulove, Mat Hamlin
Can your existing provisioning deployment address the new business, compliance and governance challenges? Wondering how to get there from here? Then, you should watch our latest webinar in which we introduce a new generation of identity management solutions that have emerged and are designed to address these challenges that legacy provisioning systems cannot.
SPONSOR: Sailpoint


5 Essential Steps for Implementing Strong Authentication in the Enterprise
White Paper
TOPIC: OTHER
Written/presented by:
Overview: Corporations are increasingly extending access to corporate data in order to run their businesses more effectively. In the process, however, one could say that they are locking the doors but opening windows through the use of technologies like mobile computing, data sharing, SaaS and Web 2.0 applications.
SPONSOR: Symantec


When Passwords Aren't Enough
White Paper
TOPIC: Password management
Written/presented by:
Authentication on websites and cloud-based services has traditionally involved a trade-off between security and usability. This paper examines the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords and two-factor authentication.
SPONSOR: Confident Technologies


FIM 2010 Technical Overview
White Paper
TOPIC: Identity management
Written/presented by: Ensynch
This document provides a technical overview of Microsoft® Forefront™ Identity Manager 2010. The document focuses on the core scenarios of declarative provisioning and deprovisioning, self-service management of users, groups, certificates and Smart Cards, user self-service management of passwords, and policy-based management. The topics covered include request processing, provisioning, self-service, customizing FIM 2010, reporting, and an overview of the deployment architecture.
SPONSOR: Microsoft


The Courion Connector Advantage
White Paper
TOPIC: eProvisioning
Written/presented by:
However, one of the challenges that companies are encountering is that, until now, the cost of expanding IAM coverage to more systems has been prohibitive. This limits their ability to bring those systems effectively under management and reap the benefits of IAM, including better security, improved regulatory compliance, lower IT overhead costs, and enhanced productivity.
SPONSOR: Courion


Guide to Claims-Based Identity and Access Control
White Paper
TOPIC: Identity management
Written/presented by:
The guide works progressively, with the simplest and most common scenarios explained first. It also contains a clear overview of the main concepts. Working source code for all of the examples can be found online (http://claimsid.codeplex.com).
SPONSOR: Microsoft


Securing Sensitive Information with Identity and Access Assurance
Webinar
TOPIC: Identity management
Written/presented by:
Identity and Access Assurance is a combination of business and information technology practices designed to ensure that only the right people have the right access to the right resources and are doing the right things. This white paper explains how Courion and RSA, The Security Division of EMC, address these challenges and provide best-of-breed solutions that deliver measureable business value.
SPONSOR: Courion


Identity and Information Security Integration
White Paper
TOPIC: OTHER
Written/presented by: Jon Oltsik, Principal Analyst at Enterprise Strategy Group
...covers the challenges IT professionals face because identity management and information security solutions were often procured, implemented, and managed independently with different tools, processes, and organizational units.
SPONSOR: Courion


The Need for Two-Factor Authentication at Enterprise Organizations
White Paper
TOPIC: OTHER
Written/presented by: InfoWorld
Two-factor authentication solutions provide an additional layer of protection for an organization's most sensitive data. While single layers and more vulnerable types of authentication factors, such as simple usernames and passwords, were once sufficient to authenticate a user's permission, those maliciously attempting to breach security measures have become increasingly sophisticated. As a result, organizations are finding that they need to exceed that sophistication with their security measures. Learn more about the results of this InfoWorld survey!
SPONSOR: Verisign


Privacy
White Paper
TOPIC: OTHER
Written/presented by: Ian Glazer, Bob Blakley
Privacy is not about data; it's about people. Privacy is not secrecy, and it is not about hiding information. Privacy is concerned with the proper handling of personal information and with respecting the dignity of the individual to whom the information refers. The fundamentally contextual nature of the use of personal information prevents us from formulating a single strict definition of "privacy." However, privacy principles accommodate this contextuality and guide the development of enterprise privacy practices that can reduce risk and cost.
SPONSOR: Burton Group


Role Based Access Control and Entitlement Management
Slides
TOPIC: Roles
Written/presented by:
The new Role-Based Access Control utilities provided by server vendors are enablers to enforcing entitlements down to the data and device level… but the ability to effectively provision, enforce, and audit these fine-grained controls across the diverse technology domains is still a significant challenge.
SPONSOR: FoxT


The evolution of strong authentication Towards a future of ubiquitous, secure digital identities
White Paper
TOPIC: Password management
Written/presented by:
Strong authentication technologies have long been used for providing an extra layer of assurance that an individual accessing computing resources is who they say they are. However, the cost of deploying and managing such systems, including the provisioning of hardware tokens and the strain on helpdesk resources dealing with lost tokens or forgotten passwords, has made their use expensive and complex. New authentication models, however, are changing all that. Key developments include next-generation authentication servers that automate all tasks involved, and services provided in the cloud. New authentication methods such as software, SMS and BlackBerry tokens are further taking the costs out of the use of strong authentication and opening up its use to a whole new range of possibilities.
SPONSOR: Quocirca


7 Things About Federated Identity Management
White Paper
TOPIC: Identity Federation
Written/presented by:
Educause has published a quick guide to 7 things you should know about Federated Identity Management. This helpful guide provides info about enterprise identity management systems which enable users to sign into multiple resources, ie. email, learning management systems, library databases, etc. with a single digital identity.
SPONSOR: Educause


Identity Intelligence Insider: The SailPoint Podcast Series
Podcast
TOPIC: Identity management
Written/presented by: various analysts
Hear from industry experts in SailPoint's ongoing podcast series, The Identity Intelligence Insider. Each month we take some time with SailPoint executives as well as leading technology thought-leaders to discuss hot topics and issues surrounding identity governance, risk management and compliance.
SPONSOR: SailPoint


Essential Guide to Identity & Access Management
White Paper
TOPIC: Identity management
Written/presented by:
Managing proper access to applications and sensitive data becomes even more important in a recession. That's why the good folks at Information Security Magazine decided to put together this E-Guide. The guide covers topics like authentication and user privileges.
SPONSOR: Information Security


Using claims for driving web sites... without writing any code
How-to
TOPIC: SSO
Written/presented by: Vittorio Bertocci
thanks to the Geneva Framework and a small sample ASP.NET control, the developer will be able to leverage identity information for driving the behavior of his page... without writing a single line of code and practically without knowing anything about identity management ! You can try this yourself on your own machine by downloading the sample code on Code Gallery.
SPONSOR: Microsoft


Reining In Sharepoint
White Paper
TOPIC: OTHER
Written/presented by:
This white paper outlines some best practices that have evolved to help protect SharePoint sites. It also describes the capabilities of Courion’s identity-aware solutions that enable IT administrators and security managers to locate, analyze and remediate SharePoint sites with users who hold access rights that are inconsistent with best practices, corporate policy, or regulatory requirements.
SPONSOR: Courion


Access Assurance: Ensuring only the right people have the right access to the right resources and ar
White Paper
TOPIC: Identity management
Written/presented by:
Access Assurance is a unique approach that ensures only the right people have the right access to the right resources and are doing the right things. This white paper defines the Access Assurance lifecycle and identifies three core components— Access Governance, Access Provisioning and Access Compliance—which enable companies with even the most complex, heterogeneous environments to increase operational efficiency and transparency, strengthen security and improve compliance, while delivering lower total cost of ownership.
SPONSOR: Courion



If you have an interesting Identity resource, us a note and we'll add it to the list.


To see the resources for a particular topic, just choose it from this list:


© Copyright 2003 - 2011, The Virtual Quill