Works in Progress

Blog archive

Upcoming FCW Feature

May 10 Reinventing the Enterprise II – Network

IT now touches nearly every aspect of government operations, in uses that will only expand and deepen in the coming years with more social networking, information sharing, and Web-based applications such as cloud computing. Yet the identity management methods that control network access to these dozens and even hundreds of applications and systems are typically handled as discrete, one-off operations. Such a stovepiped approach is extremely inefficient to develop and maintain, inconvenient for users, impedes data sharing and collaboration, and increases security risks. This primer will help executives understand the costs of fragmented identity management and how to make the business case for investments to create and participate in a more integrated, governmentwide system.

Writer: John Moore, jmwriter AT twcny DOT rr DOT com

Posted by John Zyskowski on Mar 30, 2010 at 12:20 PM


Featured

  • Elections
    voting security

    'Unprecedented' challenges to safe, secure 2020 vote

    Our election infrastructure is bending under the stress of multiple crises. Administrators say they are doing all they can to ensure it doesn't break.

  • FCW Perspectives
    zero trust network

    Can government get to zero trust?

    Today's hybrid infrastructures and highly mobile workforces need the protection zero trust security can provide. Too bad there are obstacles at almost every turn.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.