TITLE

IDM software boosts security for enterprise

AUTHOR(S)
Gupta, Alka
PUB. DATE
September 2002
SOURCE
Wireless Week;9/16/2002, Vol. 8 Issue 33, p20
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Considers the emerging identity management (IDM) software for boosting enterprise security. Application of IDM to both the wired and wireless enterprise; Key to the effectiveness of IDM; Importance of portal technology for enterprise information technology management.
ACCESSION #
7420945

 

Related Articles

  • BREAKING INTO SECURITY. Yelland, Philippa // Australian Personal Computer;Nov2001, Issue 275, p120 

    Focuses on the development of security services in the information technology (IT) industry in the United States and Great Britain. Need of clients of IT security providers to maintain solutions; Increase of network intrusion; Weapons against digital trespassers.

  • IT NOW.  // ITNOW;Sep2008, Vol. 50 Issue 5, p34 

    The article offers information on several Web blogs found in the Web site of the British Computing Society, related to information technology. BCS President-in-waiting Alan Pollard reportedly discussed software add-on. David Evans reportedly presents a series of posts about ID cards. Another...

  • Spotlight.  // eWeek;12/17/2001, Vol. 18 Issue 49, p31 

    Reports developments related to information technology in the United States as of December 2001. Enhancement of the software, TopLink 4.0 of Webgain Inc.; Availability of the VeriFinger fingerprint recognition technology of Neurotechnologija Ltd.; Introduction of the software, Service Pack 2...

  • Technology from ISC West.  // Security: Solutions for Enterprise Security Leaders;May2013, Vol. 50 Issue 5, p44 

    Information on various security equipment and services including a new IP paging solution, the Securitron R100 Surface Mounted Reader with Aperio technology and the SecureStat is presented.

  • PHOENIX TARGETS END-POINT SECURITY. Spiwak, Marc // CRN;2/27/2006, Issue 1185, p93 

    The article reports that Phoenix Technologies Inc. has introduced Recover Pro 6, an end-point security product, and a channel program for enterprise and government value-added reseller in the U.S. Recover Pro 6 allows end users to perform partial and complete restorations in just a few minutes...

  • IT Pro Welcomes Rick Kuhn to the Editorial Board.  // IT Professional;Sep/Oct2008, Vol. 10 Issue 5, p5 

    The article profiles the U.S. National Institute of Standards and Technology computer scientist Rick Kuhn. It mentions that Kuhn does technical practices in information security and computer software. In addition, he is one of the developers of role-based access control model used in information...

  • Keeping up standards. List, Willie // Computer Bulletin;Sep2002, Vol. 44 Issue 5, p24 

    Two major security standards have been revised to help organisations satisfy themselves – and their customers and partners – that their systems are secure. Willie List reports

  • SPICEWORKS UPDATES SECURITY AND HELP DESK TOOLS.  // Computer Security Update;Feb2014, Vol. 15 Issue 2, p1 

    The article informs about various updates provided by software development company Spiceworks Inc. in its products including new version of information technology (IT) management application Spiceworks 7, help desk plug-ins and security systems. Various new security systems introduced includes...

  • DOWNTIME.  // Computer Weekly;2/8/2005, p60 

    This article reports that security company Mi2g Ltd. has estimated the total economic damage from viruses, worms and Trojans is between £90bn and £110bn, making 2004 the worst year on record by a wide margin. If Mi2g's figures add up, holes in software that result in crashes, viruses and...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics