IDM software boosts security for enterprise

Gupta, Alka
September 2002
Wireless Week;9/16/2002, Vol. 8 Issue 33, p20
Trade Publication
Considers the emerging identity management (IDM) software for boosting enterprise security. Application of IDM to both the wired and wireless enterprise; Key to the effectiveness of IDM; Importance of portal technology for enterprise information technology management.


Related Articles

  • Merge: Physical, Logical Security. Hawkins, David // Security: Solutions for Enterprise Security Leaders;Mar2003, Vol. 40 Issue 3, p55 

    Discusses the successful integration of physical and logical security systems and it application in information technology. Basic communications handled by security systems through application program interface; Differences in physical access; Credential management. INSET: Tech Terms Cheat-sheet.

  • Tech companies feel call to arms. Schliesman, Kyle // Inside Tucson Business;12/3/2001, Vol. 11 Issue 36, p24 

    Focuses on the security concerns of information technology companies in Tucson, Arizona. Establishment of the 'Homeland Security Program' by Global Knowledge Economics Council; Development of homeland security solutions; Integration of knowledge management professionals to develop information...

  • Market for information tech workers likely to contract. Brannon, Keith // New Orleans CityBusiness (1994 to 2008);3/4/2002, Vol. 22 Issue 37, p7 

    Reports the plan of information technology industry to keep hiring in check for the second quarter in New Orleans, Louisiana. Plan to change staffing levels; Evaluation of network security systems; Employment of employees in IT companies. INSET: Tightening the tech belt.

  • Thales is frontrunner for Oman IT systems package.  // MEED: Middle East Economic Digest;8/27/2010, Vol. 54 Issue 35, p13 

    The article reports that Thales was the low bidder for the package to supply the full Information Technology (IT) and security systems for Muscat and Salalah International airports, Oman.

  • Respect your ex-staff. Connolly, P. J. // InfoWorld;7/9/2001, Vol. 23 Issue 28, p45 

    Reports on the security threat posed by ex-employees, especially those on the information technology (IT) staff. List of things to do when personnel in sensitive positions leave; Tips on handling departures correctly.

  • Security, IT team up.  // Security: Solutions for Enterprise Security Leaders;Mar2000, Vol. 37 Issue 3, p81 

    Reports on the need for partnership between security directors and information technology managers in an organization. Partnership in security systems that affect the organization's local area network and data communications backbones.

  • Data Trace Expands Reconveyance Tracking.  // Mortgage Servicing News;Nov2000, Vol. 4 Issue 11, p14 

    Reports the expansion of the reconveyance monitoring service of Data Trace Information Services, an information technology company in Washington. Provision of services to the title insurance industry; Functionality of the reconveyance monitoring service; Utilization of a propriety software...

  • Len Hynds. L. Nicolle // Computer Bulletin;Sep2003, Vol. 45 Issue 5, p16 

    High-tech criminals will be on the run if the head of the UK�s new cyberpolice unit pulls off plans for a partnership with industry to boost IT security overall. Lindsay Nicolle reports

  • Security Vital to Information Access. D'Aversa-Williams, Tina // Security: Solutions for Enterprise Security Leaders;Aug99, Vol. 36 Issue 8, p6 

    Comments on the importance of having security systems in electronic information networks. Significance for security and information technology managers to consider security very early in network development; Analysis of each network to determine risks and appropriate balance of access and security.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics