Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:00 AM

ID & Access Management Key Focus Next Year for Arcot

Arcot predicts identity and access management to be a key security focus for 2008

SUNNYVALE, Calif. -- Driven by rising information fraud – personal, business and financial information - and regulatory compliance, Arcot Systems, providers of authentication solutions to banks, businesses and online merchants, predicts a renewed focus on identity and access management for security departments in organizations around the globe during 2008.

The company outlines 5 trends in this area for 2008:

·1. User centric ID management - more control of who goes where in the network

No longer focused purely on the perimeter and keeping people out, security and IT departments will become more focused on controlling who is accessing what information in the network.

Arcot expects to see companies introduce more detailed identity and access management policies. These will focus more stringently on user centric identity validation– looking not just at whether they have the right user name and password, but also whether they have additional online credentials that prove that they are the actual owner of the online account or have the right to access the online portal. But the validation doesn’t stop at the perimeter, it will go on to control what specific information users have access to. As such, strong authentication will become even more an integral part of the network security infrastructure and part of a consolidated identity and access management solution as companies realize that single factor password access control is outdated.

·2. Consolidation of point Identity and Access Management solutions

Many organizations are running multiple solutions for authentication, password management, identity and access management, which can expose enterprises to fraud and information leakage, with fraudsters targeting the weakest link in the solutions suite. Arcot expects many companies will want to reduce the risk of fraud and information leakage by consolidating these systems into an overarching service-oriented architecture, which will also make management of identity and access policies easier. Analysts recognize the importance of identity validation services as being essential for fighting fraud and building online reputations.

In fact being able to effectively leverage SOA models is important for identity and access management because the applications infiltrate every level of the enterprise architecture. Identity is the single common thread that permeates every application in a modern company’s application portfolio, yet so far there has been very little industry progress towards enabling large scale identity enablement through SOA and web services.

Arcot Systems

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-05
The “Elementor Addon Elements� WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
PUBLISHED: 2021-05-05
The “Livemesh Addons for Elementor� WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
PUBLISHED: 2021-05-05
The “HT Mega – Absolute Addons for Elementor Page Builder� WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by ...
PUBLISHED: 2021-05-05
The “WooLentor – WooCommerce Elementor Addons + Builder� WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-priv...
PUBLISHED: 2021-05-05
The “Elementor Addons – PowerPack Addons for Elementor� WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scriptin...