A Case for Converging Identities

| 0 Comments | 0 TrackBacks
Identity, Access Management, Credential Issuance--Converged

Identities are data. A physical identity tells you who a person is, and that information in turn relates to data about where that person can go, what they're authorized to touch, open, file, sort, pack, send. A logical identity accomplishes the same in the virtual world made up of networks and clouds. So these identities create still more data--about what they do, where they do it, when and why.

Being able to collect and correlate data to turn it into intelligence is the core of convergence--and data about identities and what they do is a deep, richly veined mine. In this video feature combining interviews we did at the RSA Conference 2010 and at ISC West, we look at why the ability to connect physical and logical identities and match them to real and cyberworld activities--even their locations--is important, as well as some of the tools and technology available today to support and leverage that work.

(Be sure also to see our RSA/ISC West video that examines the broadening definition of convergence.)



Identity, Access Management, Credential Issuance--Converged

Identities are data. A physical identity tells you who a person is, and that information in turn relates to data about where that person can go, what they're authorized to touch, open, file, sort, pack, send. A logical identity accomplishes the same in the virtual world made up of networks and clouds. So these identities create still more data--about what they do, where they do it, when and why.

Being able to collect and correlate data to turn it into intelligence is the core of convergence--and data about identities and what they do is a deep, richly veined mine. In this video feature combining interviews we did at the RSA Conference 2010 and at ISC West, we look at why the ability to connect physical and logical identities and match them to real and cyberworld activities--even their locations--is important, as well as some of the tools and technology available today to support and leverage that work.

(Be sure also to see our RSA/ISC West video that examines the broadening definition of convergence.)



No TrackBacks

TrackBack URL: http://www.securitysquared.com/cgi-bin/mt/mt-tb.cgi/210

Leave a comment