Works in Progress

Blog archive

Upcoming FCW Feature

May 10 Reinventing the Enterprise II – Network

IT now touches nearly every aspect of government operations, in uses that will only expand and deepen in the coming years with more social networking, information sharing, and Web-based applications such as cloud computing. Yet the identity management methods that control network access to these dozens and even hundreds of applications and systems are typically handled as discrete, one-off operations. Such a stovepiped approach is extremely inefficient to develop and maintain, inconvenient for users, impedes data sharing and collaboration, and increases security risks. This primer will help executives understand the costs of fragmented identity management and how to make the business case for investments to create and participate in a more integrated, governmentwide system.

Writer: John Moore, jmwriter AT twcny DOT rr DOT com

Posted by John Zyskowski on Mar 30, 2010 at 12:20 PM


Featured

  • Defense

    DOD wants prime contractors to be 'help desk' for new cybersecurity model

    The Defense Department is pushing forward with its unified cybersecurity standard for contractors and wants large companies and industry associations to show startups and smaller firms the way.

  • FCW Perspectives
    tech process (pkproject/Shutterstock.com)

    Understanding the obstacles to automation

    As RPA moves from buzzword to practical applications, agency leaders say it’s forcing broader discussions about business operations

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.