Go With the Wind

Freedom OSS Journal

Subscribe to Freedom OSS Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Freedom OSS Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Freedom OSS Authors: Liz McMillan, Maureen O'Gara

Related Topics: Enterprise Architecture

News Feed Item

Burton Group to Address Security Architecture for the Future at Open Group Conference

Burton Group to Address Security Architecture for the Future at Open Group Conference

SALT LAKE CITY, UT -- (MARKET WIRE) -- 07/22/08 -- Burton Group, a research and consulting firm focused on in-depth analysis of enterprise technologies, announces Sr. VP and principal analyst Dan Blum will provide a keynote presentation on the future of security architecture at The Open Group Conference on Wednesday, July 23, 2008 in Chicago.

According to Burton Group's security and risk management strategies analysts, effective security network control is declining due to de-perimeterization, an emerging term to describe the erosion of the enterprise firewall as a single point of control due to many trends including workforce mobility, smarter mobile devices, business partnerships, wireless access, Service Oriented Architecture (SOA), and Software as a Service (SaaS).

Blum's keynote will be based on his recent research report, "Shifting Defenses: Security Futures for Networks, Applications, and Data." In the report, he points out industry trends will shift the defensive emphasis from network controls to endpoint-, identity-, application-, and data-level controls. He predicts an information-centric approach to IT security architecture that builds on converging XML-oriented database management systems and enterprise content management, and service oriented architecture (SOA) data services will provide lasting strategic benefits.

"The trend is moving away from large, monolithic organizational structures toward virtual enterprises," says Blum. "Individuals and organizations are becoming more empowered with computing devices and sophisticated content creation and collaboration tools that pose strong risk and regulatory pressures on IT security."

On Wednesday, Blum will discuss alternative security architectures that are gaining currency including the Jericho Forum commandments which start with the de-perimeterization problem as a premise and look beyond to the roles of secure endpoints, secure protocols, trust mechanisms, and data-level security.

More information and discussion about de-perimeterization, Blum's report, and upcoming keynote can be found at the following online resources:

* Security and Risk Management Strategies blog: http://srmsblog.burtongroup.com/

* Slidecast - Security Architecture in a Deperimeterized World: http://podcast.burtongroup.com/ip//2008/07/todays-security.html

* Jericho Forum and the Collaboration Oriented Architecture (COA) position paper: http://srmsblog.burtongroup.com/2008/05/jericho-forum-a.html

* Complimentary report: Shifting Defenses: Security Futures for Networks, Applications and Data: http://www.burtongroup.com/Guest/Srms/ShiftingDefenses.aspx

* The Open Group Conference: http://www.opengroup.org/chicago2008/

* The Jericho Forum: http://www.opengroup.org/jericho/deperim.htm

About Burton Group

Burton Group (www.burtongroup.com) is an IT research and advisory services firm that helps technologists make smart enterprise architecture decisions. Burton Group provides in-depth, IT research and advisory services to executives and technologists at Global 2000 organizations. Focused on strategic business technologies and the unique needs of enterprise organizations, Burton Group provides clients company-wide access to its world-renowned analysts and a suite of powerful, intuitive research and decision support tools unmatched in the industry.

Add to DiggBookmark with del.icio.usAdd to Newsvine

Contact:
Amie Johnson
801-304-8136
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.