The search found 3759 results.
Blog
Just a quick post to congratulate OhioHealth's CTO Jim Lowder on being named to InfoWorld's CTO 25, a short list of visionaries recognized for their industry leadership and technological contributions. Welcome to the club.
Blog
Having spent last week at the 2008 International MUSE (Medical Users Software Exchange) Conference in Grapevine Texas - the 25th annual gathering of clinical and technical users of Meditech software - I was delighted to see SSO is such a hot topic among this group. There were five customer presentations related to SSO and Strong Authentication, and all of them were filled to capacity.
Blog
After the recent 2008 HIMSS Conference, we conducted a survey of 171 healthcare IT decision makers to identify some of the trends they face relating to identity management. I wanted to call out a few interesting data points...
Blog
I work in the field for Imprivata, working with customers day in, day out. And the single most heard question I get relating to our products is: 'which authentication technology should I use'. Fingerprint? Yeah that's good, I will never forget my finger, right? Or a prox card? Even better, because I can use that to open doors, pay at the lunch cashier, and so forth. Nah - maybe a smartcard is better. Or a one-time-password token. Or ...
Of all of the suggestions I made above, none of them is ideal. All of them have pros and cons, and really, all of them have very different characteristics. In my mind, there are three/four things to ask yourself when choosing an authentication technique...
Blog
Next week, Tuesday 27th of May, we will be speaking at the ICT & Healthcare seminar in Ede, the Netherlands. Topic of our discussions will be clear and simple: how can we restore the 'Identity balance'. With this topic, we aim to explore how customers and partners can work with healthcare organisations to strike the right balance between...
Blog
To paraphrase Princess Leia, ‘the more you tighten your grip, the more star systems will slip through your fingers.' The same can be said in trying to manage identities in today's enterprise. A number of weeks back, I got into a discussion with the 451Group's Steve Coplan about this very topic: the chaos of identities.
Blog
I'm often asked what seems like a simple question: 'what's new in identity management?' As simple as it is, it's a big question so here are five trends that I see out there for identity management... at least for now.
News
Research and Markets (http://www.researchandmarkets.com/research/aeb090/electronic_access) has announced the addition of the "Electronic Access Control Systems - Global Strategic Business Report" report to their offering. This report analyzes the worldwide markets for Electronic Access Control Systems in US$ Million by the following Service Types: Card-Based EACS (Proximity Cards, Smart Cards, Legacy Technology Based Cards, & Others), Biometrics-Based EACS (Fingerprint, Face Recognition, Voice/Signature Verification, Hand Geometry, & Iris Recognition), Audio (Intercom, Telephone) and Video-Based EACS, and Keypad-Based EACS. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Middle East, and Latin America. Annual estimates and forecasts are provided for the period 2009 through 2017. Also, a six-year historic analysis is provided for these markets.
News
Identity and access risk management provider to expand presence in central Europe