News

Wednesday, June 27, 2012

The Strands of Your Identity Web

View on Mobile Phone | View as Web Page
Security Update
Security Solutions
The Strands of Your Identity Web
by Sean Deuby

One of the challenges that identity professionals face is that they rarely have to deal with just one identity system, such as Active Directory (AD). No, there's usually quite a collection of systems that provide identity inside your company, and often part of your job is to somehow tie all these systems together in some coherent manner for your applications to use. Read More... 


ADVERTISEMENT

Innovative Ways to Improve Software Quality & Development Agility
Technologies that could help your company enable continuous integration testing of heterogeneous environments. Check out this brief webcast today!


Security News and Features
Using Transparent Data Encryption
Mike Otey web
by Michael Otey

Securing sensitive data is a critical concern for organizations of all types and sizes. Credit card numbers, medical and health records, and other personal information must be stored and secured in such a way that only authorized personnel are able to access the information. Before SQL Server 2008, this type of encryption needed to be handled by the application. Managing the encryption keys was a manual process, and accessing the encrypted data required writing application code. SQL Server 2008 addressed these issues by bringing the ability to encrypt data into the database engine itself with its Transparent Data Encryption (TDE) technology.  Read More... 


Securing Space
TonyHowlett
by Tony Howlett

With the splash down earlier this month of the Dragon capsule from SpaceX corporation, we herald in a new era of private competition in the space race. SpaceX, a startup funded by Paypal billionaire Elon Musk managed to do what only three countries have done before; send a vehicle to the International Space Station. The mission was to resupply it, but within a year or so, they hope to be sending astronauts rather than just payloads. I felt a brief moment of hopefulness in our nation's potential. Perhaps we could once again be the leader in this human condition changing field, using the power of private enterprise and entrepreneurship. During the launch, which I had the privilege of being present at, they had dual live video feeds of the both controls rooms, NASA and SpaceX.  Read More...


Give and Take
Q: What is the goal of the UAC security feature that Microsoft introduced in Windows Vista?
Promo_SPK_jandeclercq_70x91
by Jan De Clercq

A: User Account Control (UAC) is a Windows security feature that automatically informs you when you're about to start a program that requires administrator-level permissions or when a program wants to make a change that requires administrator-level permissions. Under the hood, UAC controls the permission level of your user account. UAC always tries to let you do your routine Windows work -- such as reading email, creating documents, and surfing the web -- as a standard -- that is, a non-privileged or non-administrator -- user, even if you're logged on as an administrator. Read More...


FROM THE SECURITY FORUMS
Do you have a security problem or question? Ask your peers and our experts for help at the Windows IT Pro security forum.

SHARE YOUR SECURITY TIPS AND GET $100
Share your security-related tips, comments, or problems and solutions. Email your contributions to r2r@windowsitpro.com. If we print your submission, you'll get $100. We edit submissions for style, grammar, and length.

Additional Resources

Private Cloud, System Center, & Windows Server Resources
With a wide collection of content ranging from Hyper-V and VMM, to Systems Management, PowerShell, and more, you're sure to find the answers you're looking for. You'll find videos, white papers, cases studies, and articles on all of the hottest topics for IT pros today.
   
Put the power of interactive analytics into the hands of mobile workers
Enable users to analyze data and trends practically wherever they are - even offline. The more users you can empower with analytics to help improve and speed decision making the better. Save your virtual seat! 


Join Our Community:
Facebook
Twitter
LinkedIn

Resources

In-memory analysis & interactive data visualization for BI & analytics
Get a revolutionary business intelligence workspace that gives users the ability to assemble, personalize and analyze virtually all types of data.

Harvest Best-of-Breed, Self-Service Analytical Empowerment
Learn how to deliver self-service business intelligence capabilities including browser-based analytics, powerful dashboards, and interactive data visualization. 
 
 

MORE RESOURCES

Events

Windows & Exchange Connections - Oct 29 - Nov 1, 2012 - Las Vegas, NV   With the industry's top experts, including Microsoft insiders, you'll get your infrastructure and skills in shape for the coming wave of upgrades. Attend sessions that are relevant for TODAY - go back to the office with practical tips and tricks that will help improve productivity and drive down costs. The conversation begins here in October. You won't want to miss it!

Innovative Ways to Improve Software Quality & Development Agility
Technologies that could help your company enable continuous integration testing of heterogeneous environments.
 

MORE EVENTS

 

Contact Us

About the commentary -- letters@windowsitpro.com
About technical questions --
www.windowsitpro.com/forums
About product news --
products@windowsitpro.com

Subscribe to this newsletter, click here.
 
Make sure your copy of Security Update doesn't get mistakenly blocked by antispam software! Be sure to add Security Update to your list of allowed senders and contacts.
 
You are subscribed as: boy.blogger@gmail.com . To manage your subscription, click here.

Windows IT Pro | Penton Media, Inc. | 249 W. 17th Street | New York, NY 10011 | 
©Copyright 2012, Penton Media, Inc. All Rights Reserved | Privacy Statement

No comments:

Blog Archive