Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications

    How to Avert Identity Crisis

    By
    Cameron Sturdevant
    -
    August 29, 2005
    Share
    Facebook
    Twitter
    Linkedin

      Audits required by the Sarbanes-Oxley Act and other federal and state regulatory mandates are driving the latest interest in identity provisioning technology. Fortunately, a variety of tools are emerging that will help IT managers tame the complexities of enterprise ID management.

      Identity management tools such as Courion Corp.s Enterprise Provisioning Suite 7.2 and Trusted Network Technologies Inc.s Identity 2.0 will help ease audit compliance and aid in security and productivity in general, but only if IT managers stay focused on the people who have to live with the software and hardware added to the infrastructure.

      Before evaluating such systems, IT managers must determine what is currently being done to manage identity and access to corporate data systems and then figure out what that process costs—in terms of both technology and human resources. Significant differences often exist between managerial perception and real-world experiences here, and the gap between the two must be closed before a new piece of technology is thrown into the mix.

      /zimages/4/28571.gifClick here to read how Childrens Hospital Boston made use of Courions Identity Management Suite.

      Reporting is key to getting everyone on the same page and eventually getting widespread buy-in, but it will also help organizations prove—to both internal IT and external auditors—that identity systems are working to specification. In fact, when it comes to regulatory mandates, documentation of both access and process may be as important as securing access to confidential information. The trend in identity provisioning has taken a decided turn in a forensic direction.

      So get out those ROI calculators and start figuring out how to implement an identity provisioning system that produces satisfactory audit reports. Chances are good that the same tools will also significantly reduce IT costs in the long run by streamlining the provisioning process.

      Technical Director Cameron Sturdevant is at [email protected].

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest news, commentary and analysis on regulatory compliance.

      Avatar
      Cameron Sturdevant
      Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at [email protected]

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×