Welcome to the new ZDNet! Give feedback or learn more about our updated design here. Or, return to the classic view.

Eric Norlin

Latest Posts

Why NAC is about Identity

July 13, 2006 by in Networking

Why NAC is about Identity

If you've spoken with me lately about Digital ID World, then you've heard me give my spiel on Network Access Control (NAC) - and why its so important to identity. This week, two things are bringing this topic back up for me

Rounding third and heading for home

July 11, 2006 by in Security

Rounding third and heading for home

Coming out of the Major League Baseball's All-star break, I'm reminded of the fact that it is July, and the digital identity industry is now "headed for home" on the calendar year. With that in mind, a brief report on the first part of the year seems to be in order.

Google's authentication vs. Microsoft's Live ID

June 28, 2006 by in Google

Google's authentication vs. Microsoft's Live ID

Recent announcements of Google's authentication service have prompted comparisons to Passport, and even gotten to Dick Hardt (of "Identity 2.0" fame) to call it the, "deepening of the identity silo." I'd like to contrast Google's work with Microsoft's recent work around Live ID.

Novell's acquisition strategy

June 26, 2006 by in Enterprise Software

Novell's acquisition strategy

Back on June 2nd, I told Novell to focus on their growing identity management business. Shortly thereafter, Novell's long-time CEO, Jack Messman, was replaced by Ron Hovsepian. Suddenly, it appears that Novell's new chief may be listening.

NAC is the new provisioning

June 21, 2006 by in Networking

NAC is the new provisioning

Provisioning has been the hottest selling identity product as of late. The reason is simple: compliance with legislation and regulation drives the use of provisioning (and de-provisioning) systems. But coming out of the recent Catalyst show, I'm ready to make a bold prediction: Network Access Control (NAC) is the "new" provisioning.

Top 5 Identity Fallacies: #4 Identity is Monolithic

June 12, 2006 by in Security

Top 5 Identity Fallacies: #4 Identity is Monolithic

There are several fallacies which appear and reappear in identity discussion, technologies, and deployments. This is the fourth article in a series which examines these fallacies, why they are so easy to fall into, and what their consequences are in networked computing.

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All

Most Popular