Network identity - defining your key asset

May 2002 IT infrastructure

Network identity is set to become an integral part of today's business continuity processes. Implementing network identity solutions will enable companies to manage and control their most vital assets - their customers. Says Scott McNealy, chairman and CEO of Sun Microsystems: "Network identity is the defining issue of the decade, maybe the century. It defines the only corporate asset that counts - your community. Your customers, shareholders, partners and employees. Either get it, or your biggest competitor will."

Managing network identities allows organisations to build stronger, more tailored relationships and services - built to widely different levels of security. But, according to Stefano Mattiello, managing director of Sun Microsystems SA, companies need to get their Network identity houses in order before they can start taking advantage of all the opportunities associated with the Internet and Web services.

"Organisations have three identity objectives and foremost is the need for heightened security and identity control around an organisation's Web interactions in the form of accurate authorisation and authentication," explains Mattiello.

"Second is the need for an open identity service, rather than one with the potential to disintermediate them downstream. Finally, companies need a rapid and comprehensive way to set up a robust, scalable and reliable backbone for establishing their own network identity system."

Sun Microsystems is a founding member of the Liberty Alliance (, which seeks to develop and deploy a federated network identity that enables ubiquitous single sign-on, decentralised authentication and open authorisations from any device connected to the Internet. Concludes Mattiello: "Federated services will result in new levels of business efficiency. It is the only road to a network-based economic system that opens the door to world of opportunity in this era of B2B and B2B e-commerce."

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Home-grown, cloud-based safety and security solutions
Residential Estate Security Handbook 2020 , IT infrastructure, Integrated Solutions
BeSecure has taken security and communications technologies and turned them into what is best described as care and safety solutions for the estate community in South Africa.

Bringing the wonders of fibre to your estate
Residential Estate Security Handbook 2020, Vox Telecom , IT infrastructure
The Hi-Tech Security Solutions’ Residential Security Conference in Durban was a magnificent event where Vox showcased its visitor management solution.

Protecting your electrical equipment
Residential Estate Security Handbook 2020, BFR Digital , IT infrastructure
Load shedding is a constant danger as the surges that occur when the lights come on cause damage to electronic equipment, including security equipment, unless it is protected.

Hunting for backdoors in counterfeit Cisco devices
Issue 5 2020 , IT infrastructure
F-Secure’s investigation highlights challenges facing organisations that discover counterfeit devices in their IT infrastructure.

Secure biometric access for SAP
Issue 4 2020 , IT infrastructure
An expanded partnership offering endpoint biometric security for SAP takes on new importance amid COVID-19.

Security on the edge
Issue 4 2020 , IT infrastructure
From less than $1.5 billion in 2017 to an anticipated $9 billion by 2024, the worldwide edge computing market is set to show significant growth in the coming years.

Tips on secure remote working
Issue 3 2020 , IT infrastructure, Cyber Security
NordVPN advises how to stay secure while working from home during the coronavirus outbreak.

Wall-mounted solution for mission-critical IT
Issue 3 2020 , IT infrastructure
Schneider Electric’s latest iteration of its 6U wall mount has enabled convenient and easy deployment of edge computing systems.

Secure backup for SMEs
Issue 3 2020 , IT infrastructure
Cleeks Cloud has announced the launch of its online, direct-to-cloud backup solution aimed at the South African SME market.

Sophos Launches Xstream
Issue 3 2020 , IT infrastructure
SophosLabs research indicates 44% of prevalent information thieves use encryption to hide stolen data.