Advisor

Do You Know Where Your Data Is? Securing Distributed Enterprise Architectures

Posted December 8, 2009 | | Amplify

Enterprise data integrity, security, and confidentiality have long relied on combined network- and application-based security. As enterprise architectures become more complex -- both increasingly distributed and centralized -- the old models for securing data are no longer applicable when the data can be anywhere, accessible from any place and at any time.

About The Author
Beth Cohen
Beth Cohen is President of Luth Computer Specialists, Inc., a consulting practice specializing in IT infrastructure strategy. She has more than 25 years of experience building strong IT delivery organizations from both the user and vendor perspectives. Most recently, Ms. Cohen was Operations Director for Dossia, a company building a portable medical record Web portal designed to handle millions of records securely and transparently. Previously,… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.