Automate access control
Distributed systems and the Web have helped create a security paradox: providing workers enough access to do their jobs, while maintaining enough control over the network to keep it secure.
As a result, security tool vendors are assiduously working on what's been dubbed "identity management" in order to make administration easier. Nearly every security software vendor touts a tool for central control of user access, authorization, and authentication.
But the fundamental challenges remain: How do you determine who gets access to what, and which systems a user needs to do his job? The goal, obviously, is granting only those permissions needed and no more.
[ Read more ]