Executive Summary

Data Security Implications for New Enterprise Architectures

Posted September 30, 2009 | Leadership |

Enterprise data integrity, security, and confidentiality have long relied on combined network- and application-based security. When data was secured on local centralized systems using role-based account access supported by strong firewalls, the thinking was that corporate data was well secured.

About The Author
Beth Cohen
Beth Cohen is President of Luth Computer Specialists, Inc., a consulting practice specializing in IT infrastructure strategy. She has more than 25 years of experience building strong IT delivery organizations from both the user and vendor perspectives. Most recently, Ms. Cohen was Operations Director for Dossia, a company building a portable medical record Web portal designed to handle millions of records securely and transparently. Previously,… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.