Eric Norlin

Latest Posts

Why NAC is about Identity

Why NAC is about Identity

If you've spoken with me lately about Digital ID World, then you've heard me give my spiel on Network Access Control (NAC) - and why its so important to identity. This week, two things are bringing this topic back up for me

published July 13, 2006 by

Comments

Rounding third and heading for home

Rounding third and heading for home

Coming out of the Major League Baseball's All-star break, I'm reminded of the fact that it is July, and the digital identity industry is now "headed for home" on the calendar year. With that in mind, a brief report on the first part of the year seems to be in order.

published July 11, 2006 by

Comments

Google's authentication vs. Microsoft's Live ID

Google's authentication vs. Microsoft's Live ID

Recent announcements of Google's authentication service have prompted comparisons to Passport, and even gotten to Dick Hardt (of "Identity 2.0" fame) to call it the, "deepening of the identity silo." I'd like to contrast Google's work with Microsoft's recent work around Live ID.

published June 28, 2006 by

Comments

Novell's acquisition strategy

Novell's acquisition strategy

Back on June 2nd, I told Novell to focus on their growing identity management business. Shortly thereafter, Novell's long-time CEO, Jack Messman, was replaced by Ron Hovsepian. Suddenly, it appears that Novell's new chief may be listening.

published June 26, 2006 by

Comments

NAC is the new provisioning

NAC is the new provisioning

Provisioning has been the hottest selling identity product as of late. The reason is simple: compliance with legislation and regulation drives the use of provisioning (and de-provisioning) systems. But coming out of the recent Catalyst show, I'm ready to make a bold prediction: Network Access Control (NAC) is the "new" provisioning.

published June 21, 2006 by

Comments

Top 5 Identity Fallacies: #4 Identity is Monolithic

Top 5 Identity Fallacies: #4 Identity is Monolithic

There are several fallacies which appear and reappear in identity discussion, technologies, and deployments. This is the fourth article in a series which examines these fallacies, why they are so easy to fall into, and what their consequences are in networked computing.

published June 12, 2006 by

Comments

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories