{"id":1124,"date":"2010-06-12T02:42:28","date_gmt":"2010-06-12T10:42:28","guid":{"rendered":"\/?p=1124"},"modified":"2010-06-12T02:46:55","modified_gmt":"2010-06-12T10:46:55","slug":"metrics-on-the-progress-of-claims-based-computing","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1124","title":{"rendered":"Claims based identity tops IT security concerns"},"content":{"rendered":"<p><a href=\"http:\/\/www.networkworld.com\/Home\/jfontana.html\" class=\"broken_link\">John Fontana <\/a>has crossed\u00a0the floor, moving from the critics box to the stage.\u00a0\u00a0<\/p>\n<p>Many people will remember\u00a0John&#39;s articles\u00a0at\u00a0<a href=\"http:\/\/networkworld.com\/\">Network World<\/a>, where he served as one of the most talented and informed journalists in the world writing about network infrastructure for as long as I can remember.\u00a0<\/p>\n<p>While it is sad to lose him in his role as journalist, I really look forward to\u00a0what he will do at his new digs: Ping.\u00a0\u00a0<\/p>\n<p>I know his ability to explain identity and its issues\u00a0and technology in words people\u00a0can actually\u00a0understand will benefit the whole identity ecosystem.\u00a0 Kudos to\u00a0Andre\u00a0Durand and Ping for having the wisdom to bring him over.<\/p>\n<p>Meanwhile, t<a href=\"http:\/\/bit.ly\/9Za4Kb\" class=\"broken_link\">here&#39;s\u00a0exciting news in this post<\/a> from the new John:\u00a0<\/p>\n<p style=\"padding-left: 30px;\">If I could say it better than my former Network World colleague Ellen Messmer I would, but I can\u2019t so I\u2019m just going to link to<a href=\"http:\/\/www.networkworld.com\/news\/2010\/061010-gartner-security-identity-management.html\" class=\"broken_link\"> her story on Gartner\u2019s survey<\/a> that shows identity management projects rank first in the top five priorities for IT&#39;s security spending.<br \/>\nThe results of the survey come from interviews with IT professionals at 308 companies.<\/p>\n<p style=\"padding-left: 30px;\">But let me highlight two paragraphs from Ellen&#39;s story:<\/p>\n<p style=\"padding-left: 30px; margin-left: 0.5in;\">\u201cIdentity management appears to be taking the lead as a top priority as businesses look to deploy some of the more advanced federated identity technologies both within the enterprise for single sign-on and as a way to potentially extend identity-based access control into cloud-computing environments.\u201d<\/p>\n<p style=\"padding-left: 30px;\">And this one:<\/p>\n<p style=\"padding-left: 30px; margin-left: 0.5in;\">\u201cBut in terms of firewalls as a priority, [Gartner] notes that there&#39;s a movement to install next-generation firewalls.\u201d<\/p>\n<p style=\"padding-left: 30px;\">On that last point, check this link to <a href=\"http:\/\/www.pingidentity.com\/blogs\/pingtalk\/index.cfm\/2010\/3\/19\/Harder-Outer-Shell-Soft-in-the-Middle\" class=\"broken_link\">From Firewall to IdentityWall.<\/a><\/p>\n<p style=\"padding-left: 30px;\">[John is on <a href=\"http:\/\/twitter.com\/JohnFontana\" class=\"broken_link\">Twitter<\/a> where he also puts together a <a href=\"http:\/\/twitter.com\/JohnFontana\/identity-conversation\" class=\"broken_link\">Tweet list<\/a>]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gartner:  Identity management projects rank first in the top five priorities for IT&#39;s security spending.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[37,6,10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1124"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1124"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1124\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}