|
FRIDAY JULY 15, 2005
Application Security: Aligning
Developer Needs and Security Imperatives
Cross-Cutting Concern: Building
the Virtual Enterprise: Secure Networks, Secure
Applications
Network Security: Aligning
Security Policy and Network Operations
<< Return to 2005
Archive Index
Application
Security: Aligning Developer Needs and Security
Imperatives
The Web services framework enables composite applications
that leverage service-oriented architecture (SOA)
design practices, creating more cost-effective
distributed architectures. As enterprises adopt
SOA, they open their systems, enabling greater
agility and easier integration. But enterprise
architects must also protect these systems from
intentional or inadvertent threats. These security
concerns have stymied SOA and Web services implementation
for many enterprises. And whether it's a new generation
of applications based on Web services, or legacy
applications, application security is one of the
toughest problems enterprises face.
Security is more than just a protocol or product.
It requires a comprehensive approach that spans
technologies, design practices, development teams,
and business processes. Security must be a conscious
goal, starting with design and development and
running through run-time policies, procedures,
and processes. But how can enterprises manage
security end-to-end? For developers, the separation
of concerns makes development more efficient by
letting developers with the appropriate expertise
implement specific functions that many applications
can re-use. But that separation of concerns also
presents thorny problems when it comes to security.
How much security expertise should developers
have? How re-usable are security services? Just
how secure are re-usable security services? To
what degree can re-usable security and identity
management services free developers to focus on
the business problem instead of security? When
so many applications and infrastructure components
are reused, where is the accountability?
During the Application Security session, seasoned
experts from Burton Group's application, identity,
and security practices will come together to discuss
the best practices that enable developers to build
secure applications. This session will cover long-term
trends and issues related to Web services security,
with special attention to the WS-Security specification
and real-world implementation considerations.
We'll discuss the difference between understanding
how to build security services (which is the job
of the security architect), and understanding
how to use security services well and wisely in
an application (which is the job of the developer).
Through our focus on these and other topics, you'll
gain a better understanding of how these emerging
technologies will affect your environment within
the next three years, enabling you to make better
decisions.
Topics include:
- A Systematic Approach
to Application Security
- Bringing information security
staff, architects, and developers together
to enhance application security
- How to determine application
security risks, policies, practices, and requirements
- How tools and governance
policies can enable secure applications, from
design through deployment and run-time
- Security in an SOA
World
- How to build security into
SOAs
- Web services security standards
update and status of adoption and interoperability
- How existing application
frameworks support security standards and
services
TOP
Cross-Cutting
Concern Sessions
Building the Virtual Enterprise: Secure
Networks, Secure Applications
In the virtual world of the networked enterprise,
the complex issues facing IT managers transcend
organizational, product, and architectural boundaries.
Crucial infrastructure technologies like security
and identity management constitute "cross-cutting
concerns," impacting multiple aspects of
both IT architecture and the business. To help
IT architects deal with that reality, the third
day of Catalyst Conference will be devoted to
Cross-Cutting Concerns - which brings together
the technologies we cover in the APS, IdPS, NTS,
and SRMS tracks. We'll re-orient our discussions
by looking not only at how these technologies
relate to each other, but at how enterprises can
take an integrated approach to solving tough problems
that transcend organizational and architectural
boundaries.
Cross-Cutting Sessions will take place simultaneously
on the last day of the conference. These sessions
will focus on a holistic view of two of the biggest
issues facing enterprise IT architects: application
and network security. Practitioners from different
enterprise IT departments will come together to
discuss requirements, solutions, and future directions
for the essential infrastructure technologies
covered in the first two days of the conference.
These sessions present a unique opportunity to
communicate and build consensus across IT departments,
and establish common goals and taxonomies. By
focusing on these Cross-Cutting Concerns, Catalyst
Conference will also enable a common context for
discussing and understanding issues that enterprises
must address to ensure that their networks meet
business objectives without exposing the organization
to undue risk.
Burton Group analysts, customer cases studies,
and select vendor presentations will demonstrate
how enterprises can effectively use identity and
security infrastructure technologies to solve
real-world enterprise problems. You'll come away
from this session with actionable advice that
your organization can factor into its plans.
TOP
Network
Security: Aligning Security Policy and Network
Operations
Traditional approaches to network security leverage
identity and application-level information to
make better security decisions. Location-aware
perimeters are supplementing internal gateways
and switches that require a combination of device
and user identity information when making decisions
to grant access to protected network services
and applications. But as organizations divide
responsibility for security and network management,
conflicts between these two functions become a
common problem.
In addition to these internal management issues,
external problems are growing exponentially, in
terms of not only the threats they pose, but the
effort necessary to combat them. Mobile devices
that access services from both within and outside
the perimeter present new challenges to network
and security architects, for example. Further
compounding the problem, spam represents a substantial
drain on network resources and is a common method
for propagating viruses, worms, phishing, and
other attacks. To limit the damage that can result
when a virus or worm compromises an endpoint system,
enterprises are beginning to deploy systems that
monitor endpoints for compliance with mandated
security practices, and enforce remediation for
non-compliant systems.
The Network Security session will bring together
top analysts and consultants from Burton Group's
network, identity, and security services that
focuses on how enterprises can leverage identity
management and other security technologies to
build secure enterprise networks. The sessions
will discuss network security requirements, and
how identity management and security architecture
will meet those requirements, now and in the future.
Network architects, security architects, and identity
management specialists will collaborate, discussing
how their respective pieces of the puzzle can
combine to create more effective enterprise network
architectures. A combination of Burton Group analyst,
customer, and vendor experts will explore network
security challenges, technologies, and architecture
strategies that work to improve the security of
enterprise networks.
Topics include:
- Governance
- How risk and audit relate
to network security
- Strategies for reducing friction
between network and security organizations
- Overlap between security
architecture and network architecture
- Identity-Based Networking
- 802.1X
- User and role-based network
security
- Identity-based monitoring
and enforcement
- Security and Network
Perspectives on Spam
- Challenges, threats, and
technical approaches
- Mobile Security
- Device security
- Technologies to protect data
at rest and in transit
- Location-Based Security
- Using physical location as
a third access credential
- Location as a dynamic provisioning
element
TOP
< Back to Catalyst
Conference North America 2005 Archive
|
|