John Worrall

Subscribe to John Worrall: eMailAlertsEmail Alerts
Get John Worrall: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by John Worrall

Organizations have traditionally viewed the management of digital identities as a necessary expense. But now those same organizations see it as a strategic imperative, something that will help them succeed by adding business value. Strategic security initiatives, like identity and access management, present organizations with real business opportunities and provide a framework for managing digital identities. In today's competitive economy, security investments must contribute much more value to the organization's overall business by enabling key applications. Security is no longer just about mitigating risks by keeping the "bad guys" out. It's also about achieving key business objectives such as cost reduction and revenue generation, which can only happen by letting the "good guys" in. To this end, identity and access management delivers value and contributes to t... (more)

Identity Theft: More Than A Stolen Wallet

As the role of IT administrators continues to expand, it is imperative that companies not lose sight of their core responsibilities: managing and protecting corporate data. This responsibility is becoming increasingly important in the enterprise due to the staggering rise in identity theft around the globe. A recent report from the Federal Trade Commission (FTC) found that identity theft has achieved the dubious honor of being the most common form of fraud, accounting for 43% of all complaints. And as more and more corporate and personal information becomes accessible online, t... (more)

Federated Identity Management Addresses E-Business Challenges

E-business initiatives - such as enterprise, B2B, and B2C applications - typically reach throughout and beyond an enterprise, requiring users to move across networks, applications, and security domains. To be effective, this movement must be transparent to the user. Consider what's involved in this: a single identity with one registration process and one login procedure. Not easy, considering hundreds, thousands or even millions of users require access to a growing number of applications which may or may not be under the direct control of the enterprise. A single organization ca... (more)