Eric Norlin

Latest Posts

Why NAC is about Identity

Why NAC is about Identity

If you've spoken with me lately about Digital ID World, then you've heard me give my spiel on Network Access Control (NAC) - and why its so important to identity. This week, two things are bringing this topic back up for me

July 13, 2006 by in Networking

Rounding third and heading for home

Rounding third and heading for home

Coming out of the Major League Baseball's All-star break, I'm reminded of the fact that it is July, and the digital identity industry is now "headed for home" on the calendar year. With that in mind, a brief report on the first part of the year seems to be in order.

July 11, 2006 by in Security

Google's authentication vs. Microsoft's Live ID

Google's authentication vs. Microsoft's Live ID

Recent announcements of Google's authentication service have prompted comparisons to Passport, and even gotten to Dick Hardt (of "Identity 2.0" fame) to call it the, "deepening of the identity silo." I'd like to contrast Google's work with Microsoft's recent work around Live ID.

June 28, 2006 by in Google

Novell's acquisition strategy

Novell's acquisition strategy

Back on June 2nd, I told Novell to focus on their growing identity management business. Shortly thereafter, Novell's long-time CEO, Jack Messman, was replaced by Ron Hovsepian. Suddenly, it appears that Novell's new chief may be listening.

June 26, 2006 by in Enterprise Software

NAC is the new provisioning

NAC is the new provisioning

Provisioning has been the hottest selling identity product as of late. The reason is simple: compliance with legislation and regulation drives the use of provisioning (and de-provisioning) systems. But coming out of the recent Catalyst show, I'm ready to make a bold prediction: Network Access Control (NAC) is the "new" provisioning.

June 21, 2006 by in Networking

Top 5 Identity Fallacies: #4 Identity is Monolithic

Top 5 Identity Fallacies: #4 Identity is Monolithic

There are several fallacies which appear and reappear in identity discussion, technologies, and deployments. This is the fourth article in a series which examines these fallacies, why they are so easy to fall into, and what their consequences are in networked computing.

June 12, 2006 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All

Most Popular