SOA in the Cloud Expo
I’ll be delivering a Webinar next week about Layer 7’s Enterprise Service
Manager (ESM) product. ESM offers the global view of clusters of SecureSpan
Gateways and the services under their management.
It’s functions fall into three main areas:
Centrally manage and monitor all Gateways and associated services across the
extended enterprise and into the cloud
Automated Policy Migration
Centrally approve and then push policy to any Gateway across the enterprise,
automatically resolving environmental discrepancies
Remotely manage, troubleshoot, backup and restore all Gateways, supporting
full disaster recovery
ESM is an important tool for managing SOA in the Enterprise, but it also
plays a critical role when SOA moves to the cloud.
In addition to extending an organization’s visibility and control, ESM
Cloud Expo on Ulitzer Technology Review has published an interview with
cryptography pioneer Whitfield Diffie that is worth reading. I had the great
pleasure of presenting to Whit down at the Sun campus. He is a great
scientist and a gentleman.
In this interview, Diffie–who is now a visiting professor at Royal
Holloway, University of London–draws an interesting analogy between cloud
computing and air travel:
“Whitfield Diffie: The effect of the growing dependence on cloud computing
is similar to that of our dependence on public transportation, particularly
air transportation, wh... (more)
Cloud Security Journal on Ulitzer
Two weeks ago, I delivered a webinar about new security models in the cloud
with Anne Thomas Manes from Burton Group. Anne had one slide in particular,
borrowed from her colleague Dan Blum, which I liked so much I actually
re-structured my own material around it. Let me share it with you:
This graphic does the finest job I have seen of clearly articulating where
the boundaries of control lie under the different models of cloud computing.
Cloud, after all, is really about surrendering control: we delegate
management of infrastructure, application... (more)
Security, Management & Compliance Track at Cloud Expo
Register Today and Save $550 !
Explore Sponsorship Opportunities !
Today marks the beginning of RSA conference in San Francisco, and the Cloud
Security Alliance (CSA) has been quick out of the gate with the release of
its Top Threats to Cloud Computing Report. This peer-reviewed paper
characterizes the top seven threats to cloud computing, offering examples and
The seven threats identified by the CSA are:
Abuse and Nefarious Use of Cloud Computing Insecure Application Programming
Interfaces Malicious Insider... (more)
Are SOA anti-principles more important than success principles? Last week Joe
McKendrick >asked the question. The idea of anti-principles came from Steve
Jones, who a few years back did some nice work documenting SOA anti-patterns.
In a post published last fall, Steve builds on his ideas, observing:
The problem is that there is another concept that is rarely listed, what are
which is one of those good questions that should give you pause.
In the same way as Anti-Patterns give you pointers when its all gone wrong
then Anti-Principles are the ... (more)