Radiant Logic Reveals 3 New Directory Offerings

Radiant Logic has segmented its flagship RadiantOne Virtual Directory Server (VDS) into two separate products: Virtual Directory Server (VDS) Proxy Edition 5.1 and VDS Context Edition 5.1. It has also released Identity and Correlation Server (ICS) 5.2. RadiantOne products all share a data modeling and virtualization engine.

VDS Proxy Edition 5.1, available at the end of April 2009, is a virtual directory server for lightweight user-directory integration projects. The new edition features a new join engine, new tools for easier administration and configuration, and more advanced reporting and auditing capabilities.

VDS Context Edition 5.1, available at the end of May 2009, performs identity and context integration, scalable for high-volume, high complexity environments. This is useful, for example, in environments where separate units want to maintain their own infrastructure and security requirements but the central organization wants to integrate security domains into a common virtual namespace for consistent and compliant security enforcement. By isolating applications from the complexity of backend sources, VDS Context Edition provides a single unified view of the community, enabling authentication, authorization, audit, and profile management for enterprise initiatives, such as Web access management, portal single-sign-on, and federation.

"Traditionally, virtual directories have been seen as a tactical point solution," said Michel Prompt, founder and CEO of Radiant Logic. "By adding the Context Edition to our flagship VDS product, we're now providing a complete strategic solution for your entire enterprise infrastructure. Different environments and initiatives demand different tools. RadiantOne now delivers secure identity integration and context management at every level, scaling up with you as your needs evolve."

ICS 5.2, expected this summer, enables correlation and synchronization of data across disparate identity silos for a unified view of identity data across applications and security domains.

"Traditionally, applications have each had their own database repository to support custom data models and provide fast data access," writes Noel Yuhanna, Forrester Research analyst, in his report, "Securing Next-Generation Information Architectures." "However, as the portfolio of applications grows, these independent data repositories must integrate with others to offer a complete and correct view of business data. Inconsistent data from these applications leads to bad business decisions and saps customer satisfaction."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • Analyst or Scientist uses a computer and dashboard for analysis of information on complex data sets on computer.

    Anthropic Study Tracks AI Adoption Across Countries, Industries

    Adoption of AI tools is growing quickly but remains uneven across countries and industries, with higher-income economies using them far more per person and companies favoring automated deployments over collaborative ones, according to a recent study released by Anthropic.

  • businessmen shaking hands behind digital technology imagery

    Microsoft, OpenAI Restructure AI Partnership

    Microsoft and OpenAI announced they are redefining their partnership as part of a major recapitalization effort aimed at preparing for the arrival of artificial general intelligence (AGI).

  • computer monitor displaying a collage of AI-related icons

    Google Advances AI Image Generation with Multi-Modal Capabilities

    Google has introduced Gemini 2.5 Flash Image, marking a significant advancement in artificial intelligence systems that can understand and manipulate visual content through natural language processing.

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.