Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking

    Startup Combines Identity Management, Access Control

    By
    Paula Musich
    -
    July 25, 2006
    Share
    Facebook
    Twitter
    Linkedin

      Startup Apere hopes to carve out a place in the midsize enterprise with a unique security appliance that melds identity management with access control.

      The Identity Managed Access Gateway takes the labor out of creating firewall policies by automatically discovering identity management information that already exists in the network and in applications and then creating policies based on that information.

      “Were taking into consideration application directory, network rights and application access rights,” said Ram Jayam, CEO of the San Jose, Calif., company.

      “Were consolidating identities from all those and doing a cleansing process,” he said. That process can identify orphaned accounts—accounts that no longer have a user associated with them—and flag the abandoned accounts to be deleted. Jayam believes IMAG is the first product to integrate identity management and access control.

      “Like most entrants in that market, it depends on how you interpret both sides of that,” said Scott Crawford, senior analyst with Enterprise Management Associates in Boulder, Colo. “[Apere is] doing fairly novel integration of identity provisioning. They have a very strong focus on extending more traditional identity management and making it available in appliance form factor and positioning it for the midmarket.”

      /zimages/5/28571.gifTo read more about identity management, click here.

      While orphaned accounts can represent a big security risk, they are difficult to locate and hard to reconcile across different systems, said beta tester Blake Smith, information security officer at Childrens Hospital and Regional Medical Center in Seattle.

      “For us, the biggest benefit is the time reduction. We have thousands of accounts in our systems. To reconcile them manually is an incredibly labor-intensive process. This can do a lot of data manipulation dynamically,” he said.

      While some industry estimates suggest that about 60 percent of active accounts are orphaned, Smith believes that percentage is closer to 40 percent for his organization.

      To ensure that the information IMAG uses to block unauthorized traffic is correct, it performs a cleansing function in which it begins with a “known good list” of identities that is singled out by the customer, Jayam said. Such a list could come from a human resources directory, an ERP (enterprise resource planning) application or an implementation of Microsofts Active Directory.

      IMAG, targeted at enterprises with between 500 to 1,000 users, sits between large enterprise management suites such as those from IBMs Tivoli unit or CA, which are targeted at Fortune 500 companies, and point tools for access control. The suites are too costly and difficult for medium-sized enterprises to implement, and the point tools dont address identity management, Jayam said.

      IMAG, which operates as a central enforcement point for the reconciled identity management data, also provides a dashboard that allows administrators to add and delete users, make changes, see flagged accounts and create a task list. “We provide organizations with a framework for a comprehensive identity management program,” said Jayam.

      A library of connectors provides the links into a range of standards-based directories in different applications or systems. The library is available as an optional subscription service. The IMAG appliance and software, priced at $15,000, is due July 25.

      /zimages/5/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Paula Musich

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×