An Identity Management Primer

Aisien, John
March 2006
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p60
Trade Publication
The article focuses on the increasing popularity of the use of identity management in the security systems industry. Several enterprises and their chief security officers are giving more emphasis on identity management due to the evolution of network domains and increasing internal security threats and regulatory compliance. Identity management software tools provide intelligence and visibility into which employees have access to what applications, systems or data and who approved that access.


Related Articles

  • Keyscan Inc.  // Security: Solutions for Enterprise Security Leaders;Oct2009 Supplement, p4 

    The article presents a corporate profile for Whitby, Ontario-based Keyscan Access Control Systems. The company provides a complete access control solution that meets the needs of customers. Its products include System VII Access Control Management Software, DSC software module for integration...

  • A SMARTER Gatekeeper. Violino, Bob // Baseline;Dec2006, Issue 67, p66 

    The article discusses identity management. A key in effective information security strategies is handling the identity of people who have access to secured information such as business data. Technology such as identity and access management tools are being used to monitor people and the data...

  • Identifying the ID Management Market.  // Baseline;Dec2006, Issue 67, p72 

    Several charts are presented including a graph showing the worldwide sales of identity and access management tools, a pie graph that shows operating systems that have access management tools and a table that shows the number of companies that experienced security breaches.

  • Applying Software in Access. Mesenbrink, John // Security: Solutions for Enterprise Security Leaders;Mar2003, Vol. 40 Issue 3, p21 

    Discusses the application of computer software to access control and security systems. Focus of the software on flexibility; Necessity of integrating access control system with human resources system; Integration of lighting, heating, air conditioning and other systems with the access control...

  • Using a Computer Access Request Process to Manage Identification and Authentication.  // Bank Security Report;Feb2013, Vol. 42 Issue 2, p2 

    The article discusses the use of a computer access request process to manage identification and authentication. The author describes the procedures and responsibilities for the Computer Access Request Process which includes three areas, the computer log-on process, the types of access accounts...

  • Some Thoughts on Digital IDs. McCormick, John // Interactive Week;10/1/2001, Vol. 8 Issue 38, p8 

    Presents the author's thoughts on digital identification technology. How digital identification would simplify signing on to the Internet and online authentication.

  • Democratic Hacks. Sprigman, Chris // Foreign Policy;Sep/Oct2003, Issue 138, p90 

    Reports on the launch of Six/Four computer software from Hacktivismo, which would allow Internet users to bypass Internet censors in September 2003. Features of the software; Significance of the software to authoritarian states; Countries which are blacklisted from downloading Six/Four software...

  • Software Architecture of JTAG Security System. SANG-GUUN YOO; KEUN-YOUNG PARK; JUHO KIM // WSEAS Transaction on Systems;Aug2012, Vol. 11 Issue 8, p398 

    The issue of JTAG security has recently become of interest not only to academic researchers but also to industrial entities. As a response to this security need, several security approaches using fuses, key matching, and three-entity authentication approaches have been proposed. However, each of...

  • 5 Steps for Converting Older Systems into Open Access Control Solutions. Keating, Karen // Security: Solutions for Enterprise Security Leaders;Jun2012, Vol. 49 Issue 6, p48 

    `The article discusses the five steps to switch into open access control solutions from older security systems. It suggests that software and panel boards must be verified in order to optimize feature sets and cost-effectiveness while information and vision must be shared with integrator in...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics