VoIP Business and Virtual PBX
VoIP for business

Enterprise Architecture Practice

The panel: Jim Hietala, Vice President of Security for The Open Group; Stuart Boardman, Senior Business Consultant at KPN, where he co-leads the Enterprise Architecture Practice as so then as the Cloud Computing Solutions Group; Dave Gilmour, an Associate at Metaplexity Associates and a Director at PreterLex Ltd., and Mary Ann Mezzapelle, Strategist for Enterprise Services and Chief Technologist for Security Services at HP.

Gardner: Jim, we've seen in the public sector that governments are recognizing that cloud models could be a benefit to them. They can reduce redundancy. They can control and standardize. They're putting in place some definitions, implementation standards, in short forth. Is the vanguard of correct cloud computing with security in mind being managed by governments at this hour?

Gardner: We've as well seen that cooperation is an important aspect of security, knowing what’s going on on other people's networks, being able to share information about what the threats are, remediation, working to move quickly and comprehensively when there are security issues across different networks.

Is that a case, Dave, where having a cloud environment is a benefit? In other words to say more sharing about what’s happening across networks for many companies that are customers or clients of a cloud provider to put it more exactly than like as not spotty sharing when it comes to company by company?

Mezzapelle: You're right. It’s a little bit of that "garbage in, garbage out," if you don’t have the basic things in place in your enterprise, which means the policies, the governance cycle, the audit, and the tracking, because it doesn’t matter if you don’t measure it and track it, and if there is no business accountability.

David said it—each individual company is responsible for its own security, nevertheless I would say that it’s the business owner that’s responsible for the security, because they're the ones that ultimately have to answer that question for themselves in their own business environment: "Is it enough for what I have to get done? Is the agility more important than the flexibility in getting to some systems or the accessibility for other people, at this stage with some of the ubiquitous computing?"

So you're right. If it’s an ugly situation within your enterprise, it’s going to get worse when you do outsourcing, out-tasking, or anything else you want to call within the cloud environment. One of the things that we say is that organizations not only need to know their research, nevertheless they have to get better at relationship management, understanding who their partners are, and being able to negotiate and manage that effectively through a series of relationships, not just transactions.

Gardner: If data and sharing data is so important, it strikes me that cloud component is going to be part of that, especially if we're dealing with business processes across organizations, doing joins, comparing and contrasting data, crunching it and sharing it, making data in fact part of the business, a revenue generation activity, all seems prominent and likely.

Mezzapelle: The experience that I have is taking everything into consideration in some of the business frameworks for particular industries, like healthcare and what it takes to comply with the HIPAA regulation, or in the financial services industry, or in consumer products where you have to comply with the PCI regulations.

You've already talked about how complex it's going to be as you move into trying to understand, not only for that data, that the name Mary Ann Mezzapelle, happens to be in five or six different business systems over a 100 instances around the world.

That's the importance of something like an enterprise architecture that can help you understand that you're not just talking about the technology elements, nevertheless the information, what they mean, and how they are prioritized or critical to the business, which at times comes up in a business continuity plan from a system point of view. That's where I've advised customers on where they might start looking to how they connect the business criticality with a piece of information.

So, when you have a particular project that does a certain kind of security implementation, you can see what the business return on it is and how it as a matter of fact lowers risk. We found that it’s better to spend your money on getting a better system to patch your systems than it is to do some other kind of content filtering or something of that sort.

Function to XYZ corporation

So if I'm outsourcing a function to XYZ corporation, being able to measure what risk am I inheriting from them by virtue of them doing some IT processing for me, could be a cloud provider or it could be somebody doing a business process for me, whatever. So there's work going on there.

Mezzapelle: As late as this, I think it’s going to be more evolution than revolution, however I'm as well one of the people who've been in that part of the business—IT services—for the last 20 years and have seen it morph in a little bit different way.

More information: It-analysis