advising on IT-business alignment
IT-business alignment about us blog our services articles & reports resources your profile exposure
blog
blog
Monday, September 11, 2006

Sun Identity Manager: compliance is about more than saying what you should be doing to comply

At the Digital ID World conference taking place in California (Eric/Phil - how about extending the world of digital ID to Europe and hosting something here), Sun Microsystems announced Identity Manager 7.0, the next iteration of its identity lifecycle management (aka user provisioning) solution due for release next quarter. The key new feature of this release is what Sun refers to as identity auditing: extending compliance auditing beyond provisioing processes to the applications and systems which actually use the provisioned identity data.

Regulatory compliance has undoubtedly boosted organisations' interest in identity management solutions and the vendors have been quick to respond. However, that response has largely focussed on ensuring that policies are enforced, and can be demonstrated to have been enforced, when identity data is provisioned e.g. to ensure that users in a particular role are only provided with read-only access to a particular application. As I have discussed in our identity management report, effective compliance requires a more comprehensive response: organisations need to be able to ensure that the application actually enforces that read-only access, that any deviations are logged and so forth. Identity auditing is Sun's response to address that need and a welcome response at that. This is something I also highlighted in my discussion of Novell's integration of the Sentinel assets it acquired with e-Security.

Whilst I am positive about this new set of capabilities, I think Sun is slightly over-egging the press release pudding with the following:

enhancements to its market-leading identity management software suite that are the first to combine the capability to prevent inappropriate user access to systems and applications while detecting violations in the company's user access policies

Reading on Sun is quite careful to point out that it is the first to combine user provisionig with identity auditing but I think IBM, with Tivoli Access Manager's Common Auditing and Reporting Services could justifiably claim to deliver the same business outcome (and that after all is what the business is concerned about), albeit not tied directly into its user provisioning solution. That gripe aside, this is a good move by Sun and extends the company's already strong identity management proposition.

Organisations who are turning to identity management as part of their compliance initiatives need to carefully scrutinise potential solutions. If the vendor is focussing exclusively on the provisioning process then it's time to ask some tough questions.


Burn this feed
Burn this feed!

Creative Commons License
This work is licensed under a Creative Commons License.

Blog home

Previous posts

Well that answers that then: webMethods to acquire...
More positive interoperability news from Liberty
Complex event processing and the predictive business
Sun puts its money where its mouth is with OpenDS ...
Getting started with biometrics
BEA ups the service infrastructure stakes... or wi...
Arithmetic 2.0
"Uncompany" research reports now published
Sun's open-sourcing of Java: avoid the red herring
IBM acquires FileNET - who really stands to gain?

Blog archive

March 2005
April 2005
May 2005
June 2005
July 2005
August 2005
September 2005
October 2005
November 2005
December 2005
January 2006
February 2006
March 2006
April 2006
May 2006
June 2006
July 2006
August 2006
September 2006
October 2006
November 2006
December 2006
January 2007
February 2007
March 2007
April 2007
May 2007
June 2007
July 2007
August 2007
September 2007
October 2007
November 2007
December 2007
January 2008
February 2008
March 2008
April 2008
May 2008
June 2008
July 2008
August 2008
September 2008
October 2008
November 2008
December 2008
January 2009
February 2009
March 2009
April 2009
May 2009
June 2009
July 2009

Blogroll

Andrew McAfee
Andy Updegrove
Bob Sutor
Dare Obasanjo
Dave Orchard
Digital Identity
Don Box
Fred Chong's WebBlog
Inside Architecture
Irving Wladawsky-Berger
James Governor
Jon Udell
Kim Cameron
Nicholas Carr
Planet Identity
Radovan Janecek
Sandy Kemsley
Service Architecture - SOA
Todd Biske: Outside the Box

Powered by Blogger

Weblog Commenting and Trackback by HaloScan.com

Enter your email address to subscribe to updates:

Delivered by FeedBurner