Feeds

HP stakes bid to dominate ID market

Who do you think you are?

  • alert
  • submit to reddit

Internet Security Threat Report 2014

HP last week made a grab for a bigger slice of the lucrative identity market with the release of a National Identity System (NIS) based on Microsoft's .NET platform. The technology offers "Secure Identification Management for Governments Around the World" or (put another way) a means for states to keep tabs on their citizens. The technology comes with a modular structure that allows easy access to egovernment services and the ability to conduct secure transactions online. It can also integrate with various biometric systems.

All aboard the gravy train

Niche firms and consultants have claimed the lion's share of revenues in the identity management market thus far. HP is out to change that with a platform based on Microsoft .NET technology rather than the Unix systems traditionally used in large-scale enterprise systems. Launch of the technology comes days after the UK government reintroduced legislation paving the way for the introduction of compulsory ID cards in the UK. Existing customers include the Italian Ministry of Interior. The identity market is predicted to grow from $4.8bn in 2004 to $10.7bn in 2007, according to industry analyst firm Morgan Keegan.

HP and Microsoft are investing in the technology through initiatives such as a joint training programs and the establishment of specialist centres around the world to develop national identity systems. The system is based on Microsoft software such as Microsoft Server 2003 Enterprise Edition, Microsoft BizTalk Server 2004, Microsoft SQL Server 2000 (64-bit), the Microsoft .NET Framework and Microsoft Services. ®

Related stories

ID cards: Part II
UK ID scheme rides again, as biggest ID fraud of them all
ID cards technology is ready, says UK minister
Belgians in cunning misspelt ID card plan
Cost of ID Cards could triple, plan could breach DRA

Secure remote control for conventional and virtual desktops

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.