I recently attended a security conference where thousands of security
products from hundreds of vendors were all vying for attention. While most of
these products filled a legitimate need, the array of products reminded me of
an orchestra warming up. Each instrument may sound good by itself, but
together they would be cacophonous without a conductor.
Companies need to develop a coherent strategy to align security investments
with the real risks faced by the business. How can a business leverage
identity, role, and policy information to improve governance and security?
How can an enterprise tie together the knowledge gathered by disparate
security systems to help intelligently manage security services to
effectively protect the business and increase IT effectiveness?
This challenge mirrors what's happening in our data centers. Too many
companies have overspent on sil... (more)
Identity management just isn't what it used to be. Gone are the days when
knowing who had access to what was simply enough. In today's world of
increasing government and industry regulation; networked communications and
collaboration; and pervasive mobility, the requirements have fundamentally
changed. Effective identity management and access governance requires insight
into not only what employees are doing with their access to systems and
applications, but also how well an organization is managing and securing that
Such a comprehensive understanding of an organization'... (more)