Skip Links

Outlook 09

10 tech people you should know

These power-brokers’ decisions could shape enterprise IT for years to come

By , Network World
January 05, 2009 12:01 AM ET

Page 3 of 4

Still, Facebook's enviable stats -more than 120 million active users and the fourth most-trafficked Web site in the world - don't guarantee a welcome reception from enterprise IT teams, which will have to weigh security, privacy and productivity concerns before sanctioning Facebook for business use.

Joshua Corman, principal security strategist, IBM Internet Security Systems division

Johsua CormanCorman doesn't resort to the fear, uncertainty and doubt that so many IT security vendors use to scare up interest in their products. Instead he speaks candidly about the trouble enterprise security teams are in: "Enterprises should have cried 'uncle' a long time ago. It's impossible to be experts on every nuance, every new regulatory control, every new hacker threat," he said in a November interview with Network World.

He's also candid about the need for greater transparency in exposing threats: "We've seen the gap getting bigger and bigger between the threats and our countermeasures. Who are we helping by keeping these things to ourselves?"

Far from acting like someone whose start-up mind-set has atrophied while working for a big vendor like IBM, Corman is energized by the opportunity to strategize about security with his Big Blue peers who are shaping such key enterprise technologies as x86 server virtualization and cloud computing. Looking ahead, he hopes to see a renewed focus on risk management and less dependence on regulatory compliance as a security crutch.

Amit Jasuja, vice president of product development for identity management, Oracle

Amit JasujaOracle aims to be the undisputed leader in identity and access management, and Jasuja is driving the charge. Coordinating the campaign is no small feat, however, given the complexity of IAM and all its components: user account provisioning, password management, role management, single sign-on, authentication services, federated access management, entitlement management and more.

In 2008 Oracle released key products in its push to deliver services-based identity capabilities that can be tapped by multiple sources rather than being hard-coded into enterprise applications. Its Entitlements Server, for example, lets users centrally manage security and regulatory policies for enterprise applications and Web services, rather than embedding those policies into the code of individual applications. Another highlight is the release of Oracle Adaptive Access Manager, which uses such real-time factors as a user's geographic location and device attributes to render context-based authentication.

"There's a reason why Oracle is both the leader and the leading innovator in identity management today, and products like OAAM (and people like Jasuja) are the proof," says Dave Kearns, author of Network World's twice-weekly Identity Management Alert newsletter.

Kenneth Brill, executive director, Uptime Institute

Kenneth BrillData centers' energy consumption is unreasonably high - and headed toward unsustainably so. In a survey conducted by Brill's data-center research and advisory organization Uptime Institute, 65% of respondents said their centers would run out of power capacity in two to five years. Cooling capacity likewise is in short supply.

Our Commenting Policies
Latest News
rssRss Feed
View more Latest News