|By PR Newswire||
|June 12, 2006 03:30 PM EDT||
WALTHAM, Mass., June 12 /PRNewswire-FirstCall/ -- Novell today announced the creation of Bandit(TM), a groundbreaking open source project with a charter to unify disparate identity systems and provide a consistent approach to securing and managing identity. The identity services in development by the Bandit community are open source and will work with existing industry standards such as WS- * and Liberty Federation, and open source projects including Eclipse Higgins. Novell has already contributed significant engineering resources and code to jump start this effort. Ultimately, the goal of the Bandit project is to provide organizations with a consistent approach to enterprise identity management challenges such as secure, role- based access and regulatory compliance reporting.
"The Bandit project is looking to address one of the toughest challenges in identity management today -- provide a consistent approach to securing and managing identity," said Mike Neuenschwander, vice president and research director for the Burton Group. "The creation of identity services that abstract the complexity of identity systems and that are interoperable and freely available is a worthwhile goal and represents an important inflection point in the ongoing development of the identity management market."
While many organizations deploy identity management technologies today, disparate vendor solutions can create complexity and potentially slow adoption. By developing an open source enablement layer, Novell and the Bandit community will make it possible to standardize identity management across differing systems and resources. Bandit's freely available code can then be overlayed on an existing identity management system.
The Bandit project is focused on delivering a single, consistent experience of digital identity and includes several common identity services such as authentication, roles, policy and compliance:
-- The Common Authentication Services Adapter (CASA) provides interoperable authentication that enables application and enterprise single sign-on with a secure vault for user and system credentials. -- The Common Identity service is an implementation of the Higgins framework for representing digital identity. -- The Role Engine service can be integrated into any application to consistently calculate role information and unify authorization across systems. -- The Audit Record Framework service provides an open auditing and compliance API and receives audit records from Bandit's open identity services and other applications to provide common identity and event information to verify security and compliance.
Novell already incorporates some of Bandit's open identity services within its SUSE(R) Linux distribution and plans to include Bandit's identity services in future releases of other products. Novell will continue to support the Bandit project with substantial engineering resources and will maintain the project while the Bandit community grows.
"The Bandit project was created in response to our customers' need to reduce the complexity of identity management in the enterprise," said Jeff Jaffe, executive vice president and chief technology officer for Novell. "The industry needs to come together and deliver common identity services that provide a consistent experience, regardless of the underlying infrastructure. Novell's initial sponsorship of the Bandit project is a natural extension of our leadership in both identity and open source, and we are gratified to see the groundswell of community support."
A Community-driven Approach to Enterprise Identity Management
The Bandit project builds upon the participation of the broader identity and open source communities and many industry leaders are expressing their support and commitment to the goals of the Bandit project.
Dominic Fedronic, chief technology officer for ActivIdentity Inc., said, "The deployment of digital identity assurance and strong authentication solutions for both government and enterprise would greatly benefit from seamless interoperability and tight integration with identity management systems. ActivIdentity supports Novell's leadership with the Bandit project and Higgins as we believe the resulting open industry standards will expand the market and deliver greater value to customers."
Paul Trevithick, technology lead for the Higgins project at the Eclipse Foundation, said, "We are very pleased that Novell is promoting the adoption of open source identity technologies and that the Bandit project is contributing to and leveraging Higgins. Bandit is providing an important service by making an open identity infrastructure available on enterprise platforms including SUSE Linux."
Anthony Nadalin, Distinguished Engineer and Chief Security Architect for IBM, said, "IBM is pleased that Novell is using Higgins as the Identity Management foundation for the Bandit project. As a leading proponent of open source, IBM is committed to working with the Eclipse Higgins community to solve the identity-related challenges our customers face everyday."
George Goodman, president of the Liberty Alliance management board and director, Platform Capabilities Lab at Intel, said, "Liberty Alliance welcomes open initiatives that bring the industry closer to achieving a ubiquitous interoperable privacy-respecting identity layer for the Internet. We salute the Bandit team for contributing open source that will help advance the deployment of Liberty-enabled federations and Web services on the widest possible scale."
Kim Cameron, architect of Identity and Access for Microsoft, said: "The Identity Metasystem provides a model for identity interoperability across the industry. We're happy to see Novell playing an active role in helping realize the Identity Metasystem and look forward to working with them to ensure interoperability between our respective products."
Jim Gerken, practice manager for identity management with Novacoast, said, "We have spent years connecting disparate authentication repositories which confirms the need for consistent and standard identity services. With Novell's leadership in identity and open source, Bandit is a natural community for Novell to create that leverages its position in both markets."
Bob Lord, Red Hat senior director engineering, said, "Red Hat supports open source initiatives to build stronger identity frameworks and controls based on open standards. The Bandit project provides several initiatives that will help simplify identity management in heterogeneous environments and drive further innovation for the enterprise. We look forward to working with the open source community to extend a flexible identity framework from desktop to server, network to application."
Sara Gates, vice president of Identity Management at Sun Microsystems, said, "As a co-founder of the Liberty Alliance and a leading champion of open source, we have seen firsthand how customers are embracing open source technologies as a way to accelerate business solutions and reduce their costs. We strongly support the move of identity management services into the open source community."
Dick Hardt, Sxip Identity founder and CEO, said, "The identity management industry needs a common approach to secure, role-based access and compliance reporting for the enterprise and open source projects like Bandit from Novell and Higgins are a great step in that direction. We see this as a natural complement to the user-centric Identity 2.0 efforts being made with SXIP and DIX and are excited to work with them on adding support of Bandit, Higgins and eDirectory(TM)."
Rob Clyde, Symantec vice president of technology, office of the CTO, said, "Symantec is a strong supporter of open source initiatives that enable developer communities and vendors to work together to create flexible solutions capable of meeting the diverse needs of our customers. Companies today face a tremendous challenge as they try to integrate disparate application systems and security infrastructures each with its own authentication technologies into a cohesive, manageable solution. A standards-based approach backed by an open source implementation is a beneficial step towards addressing the vexing problem of identity management."
Jonathan Alexander, Trusted Network Technologies vice president of engineering, said, "Bandit is addressing key customer challenges, such as integrating distributed identity and roles, that we see as we help customers deploy our identity security and audit solutions. We see the Bandit and Higgins projects as filling a critical need to tie disparate identity systems together into a more pervasive, integrated and powerful solution."
Novell, Inc. delivers Software for the Open Enterprise(TM). With more than 50,000 customers in 43 countries, Novell helps customers manage, simplify, secure and integrate their technology environments by leveraging best-of-breed, open standards-based software. With over 20 years of experience, 5,000 employees, 5,000 partners and support centers around the world, Novell helps customers gain control over their IT operating environment while reducing cost. More information about Novell can be found at http://www.novell.com/.
Novell and SUSE are registered trademarks and Bandit and eDirectory are trademarks of Novell, Inc. in the United States and other countries. * Linux is a registered trademark of Linus Torvalds. All other third party trademarks are the property of their respective owners.Novell, Inc.
Web site: http://www.novell.com/
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Jul. 25, 2016 10:00 PM EDT Reads: 2,494
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Jul. 25, 2016 08:30 PM EDT Reads: 1,931
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Jul. 25, 2016 08:00 PM EDT Reads: 1,965
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
Jul. 25, 2016 07:30 PM EDT Reads: 1,881
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 25, 2016 07:15 PM EDT Reads: 1,794
We all know the latest numbers: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from last year, and will reach 20.8 billion by 2020. We're rapidly approaching a data production of 40 zettabytes a day – more than we can every physically store, and exabytes and yottabytes are just around the corner. For many that’s a good sign, as data has been proven to equal money – IF it’s ingested, integrated, and analyzed fast enough. Without real-ti...
Jul. 25, 2016 07:15 PM EDT Reads: 1,004
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Jul. 25, 2016 06:30 PM EDT Reads: 979
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Jul. 25, 2016 06:15 PM EDT Reads: 1,751
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Jul. 25, 2016 06:00 PM EDT Reads: 2,431
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Jul. 25, 2016 06:00 PM EDT Reads: 2,077
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Jul. 25, 2016 03:45 PM EDT Reads: 961
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Jul. 25, 2016 03:30 PM EDT Reads: 1,692
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 25, 2016 03:00 PM EDT Reads: 1,973
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Jul. 25, 2016 02:45 PM EDT Reads: 872
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Jul. 25, 2016 02:00 PM EDT Reads: 978
Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that viewing data in a dashboard requires a human to interpret the results and take manual action, which doesn’t scale to the needs of IoT.
Jul. 25, 2016 01:00 PM EDT Reads: 1,936
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Jul. 25, 2016 12:15 PM EDT Reads: 513
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
Jul. 25, 2016 12:00 PM EDT Reads: 1,826
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Jul. 25, 2016 11:00 AM EDT Reads: 925
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
Jul. 25, 2016 10:30 AM EDT Reads: 389