Symantec threw its hat in the identity ring yesterday, when CEO John Thompson told the audience at their annual Vision conference that identity management was a "critical part of the stack" and an "area of great interest to the company."
The topic of the “10 most important people
A response in the comment section to my last post entitled, "The many players at IIW", asks (paraphrasing): Why are there so many identity protocols, standards and specs?
The Internet Identity Workshop has been going on for the past few days. The workshop is centered on "user-centric identity," which is confusing enough to be sure, but when you throw in the various protocols, systems and groups working in it -- well, things get downright disorienting.
When Jonathan Schwartz took over the post as head-honcho of Sun, I kept my opinions quiet. My suspicion was that Schwartz might help to focus more of Sun's resources on its identity management business, but it was just that - a suspicion.
Eric's trying to log in using his brain waves, and pointing to the important questions like, "Can I still log in after six margaritas?"
Okay, so its actually only two links (I just liked that title), but they're two links that are illustrative of identity's growth and reach.
RSA's acquisition of PassMark security is interesting because of what it means for RSA and what it means for the identity industry as well.
The change in perspective to identity from location is not always intuitive. To better understand what it provides, we'll walk through a simple example that illustrates how significant this change is, and what it can enable.
Is Identity Management as a Service ("IdMaaS") a viable option?
"Drivers" are a funny thing. They're those often-ambiguous factors cited by analysts and reporters as they attempt to explain why a technology is catching on.
An acquisition, a conversion, expansion of the space, and a company moving toward identity -- all of these point to the giant gravitational pull that identity (or lack thereof) is exerting over technology and, more importantly, the Network as a whole.
DRM and ERM (enterprise rights management) are controversial topics, and ones that fit into the identity industry map.
The natural reaction to wanting more security is to create a perimeter and guard it. Many security paradigms are virtualizations of that very human reaction, and that's why they are doomed to failure except at very small scale...
Existing categories can make understanding the identity paradigm difficult. But as networking dissolves current paradigms, those categories are evolving - as they must.