Darmstadt, December 11, 2009 - Multiple login procedures with different user
name/password combinations are often productivity-sapping inconvenience for
employees. Corporate regulations on password complexity do not provide
sufficient security. Users just write down complex passwords instead of
memorizing them. Such practices are a great security risk making vital data
easily accessible to unauthorized personal.
Secure SignOn for Enterprise Single Sign-On (E-SSO) ensures high user
acceptance, high user productivity, and efficiency by significantly reducing
helpdesk calls and by reducing the time required to login to various business
applications. These factors result in a rapid and large Return-on-Investment
(ROI) after only a short period of time.
About Secure SignOn
Secure SignOn provides a comprehensive Enterprise Single Sign-On (E-SSO)
solution based on an Activ... (more)
Darmstadt, December 22, 2009 - “I live responsibly on this planet. Whether
politicians the world over are concerned or not, I am concerned about global
climate change. As this is my children’s planet too, I wish to be
proactive. At the modest level of my organization, I have launched a Green IT
initiative that will reduce energy consumption and CO2 emissions by not less
than 30%,” says SECUDE’s CEO and Founder, Dr. Heiner Kromer.
The Copenhagen Summit may not have achieved what was hoped for. However,
SECUDE, in its own modest way, has taken the initiative to tackle en... (more)
This was a topic that I thought I would really be getting into during 2010,
but somehow the Cloud never really seemed to become the story. On the
whole, I think there were more discussions regarding the definition of
Identity and the Federation of those identities between systems. However
there's still be some discussion of what the "cloud" actually is and how it
should function in various disciplines, including Identity Management.
I thought that David Kearns recent article on Avoiding "cloud anguish" an
interesting point that I would also like to comment on.
"...the “year of” ... (more)
Day 1, all I can really say is Wow! I attended sessions on the latest
addition to the SAP's Identity Management line up, some of it's oldest
technology and the future of the NetWeaver IDM. After today's session, my
mind is completely blown away.
I started the day with two informative sessions on SAP's Single Sign-on
Offering based on the technology asset acquisition from SECUDE about 18
months ago. SAP has clearly recognized that information security must begin
at the login and proceed from there. I'm looking forward to learning more
about it over the next year or so. It's a m... (more)
People often ask me what comes after Identity Management? My answer is that
As I've discussed before, it's really up to what the organization requires
and simply tacking on new workflows, approvals, and functionality is only
really useful if it will actually be used. However, I think we can make a
few generalizations about what might occur as part of a far reaching and
comprehensive IdM program.
Assuming that the initial project succeeded in its goal of creating an
authoritative data store and basic provisioning, there's always the goal of
adding more applications an... (more)