This report discusses the top business risks related to the security of consumer facing portals and the latest identity-related technologies that some organizations are already using or plan to adopt to minimize their risk.
Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
2009 Bossie Slideshows: Best open source developer toolsBest open source enterprise softwareBest open source networking softwareBest open source platforms and middleware
Read the full report: Best of Open Source Software Awards 2009
Read about the all-time Bossies:The greatest open source software of all timeTop 10 Open Source Hall of Famers
Find out what will be news for the day, with our first-thing-in-the-morning briefing.