{"id":1306,"date":"2008-12-04T17:47:05","date_gmt":"2008-12-04T17:47:05","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm"},"modified":"2008-12-19T18:52:15","modified_gmt":"2008-12-19T18:52:15","slug":"how-microsoft-and-rsa-plan-to-protect-our-sensitive-data","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm","title":{"rendered":"How Microsoft and RSA plan to protect our sensitive data"},"content":{"rendered":"<p>Mention Microsoft and security in the same sentence and most people will scoff but these day\u00e2\u20ac\u2122s it really a bit unfair\u00e2\u20ac\u00a6 Windows security has come a long way (it still has a way to go too) but nevertheless, many of the customers that I deal with run third party solutions (often at great cost) rather than trust their data security to Microsoft.<\/p>\n<p>Then there\u00e2\u20ac\u2122s digital rights management (DRM) \u00e2\u20ac\u201c we hear a lot about <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/10\/why-digital-rights-management-is-anti-consumer.htm\">how DRM is applied to music and video downloads<\/a> but little about the real practical use of this technology \u00e2\u20ac\u201c making sure that only those who are entitled to see a particular item of data (for example medical records or financial details) are able to access it.&#160; Microsoft has rights management services built into Windows as one of the many <a href=\"http:\/\/www.microsoft.com\/ida\/\">identity and access solutions<\/a> but it seems to me that very few organisations use this capability.&#160; Perhaps a few of the frequent and <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2007\/11\/25-million-people-caught-up-in-uk-government-data-security-fiasco.htm\">high profile Government data security mishaps<\/a> would be mitigated if DRM was applied to their data\u00e2\u20ac\u00a6<\/p>\n<p>Today, <a href=\"http:\/\/www.microsoft.com\/presspass\/press\/2008\/dec08\/12-04EMCRSAPR.mspx\">Microsoft and RSA \u00e2\u20ac\u201c a well-respected security company, now absorbed into EMC \u00e2\u20ac\u201c announced an expansion of their technology partnership<\/a>.&#160; Under the terms of this partnership, Microsoft will license the <a href=\"http:\/\/www.rsa.com\/dlp\/\">RSA Data Loss Prevention (DLP)<\/a> classification engine in order to trigger policy-based controls over information.<\/p>\n<p>Tom Corn, Vice President of Product Management and Marketing for RSA\u00e2\u20ac\u2122s Data Security Group, explained that organisations have a requirement to share information without limiting accessibility \u00e2\u20ac\u201c striking a balance between security and accessibility.&#160; Slating existing point products as costly, complex and not addressing the problem he explained how:<\/p>\n<ol>\n<li>Protection is an end-to-end problem and the data moves around \u00e2\u20ac\u201c existing products only acts at certain points in the data exchange.<\/li>\n<li>Infrastructure components lack visibility of the data sensitivity \u00e2\u20ac\u201c context is required to classify data and take appropriate actions.<\/li>\n<li>Existing tools and controls lack identity awareness, making it difficult to tie protection to identity.<\/li>\n<li>Management \u00e2\u20ac\u201c security policies often exist as binders on shelves and may be written by different groups within an organisation (e.g. security, or operations) leading to a disconnected approach.&#160; All too often the management policies are infrastructure-centric (e.g. laptop security policy, Internet security policy) rather than information-centric (e.g. credit card data storage policy).<\/li>\n<\/ol>\n<p>Meanwhile, <a href=\"http:\/\/www.microsoft.com\/mba\/pro_jg.mspx\">John (JG) Chirapurath<\/a>, Director of Identity and Security at Microsoft spoke about how Microsoft is licensing DLP to build it into products such as Exchange Server and Office SharePoint Server to provide content awareness, then providing identity awareness through components such as Active Directory Rights Management Services (AD RMS) to allow collaboration (which relies on knowledge of identity) whilst protecting intellectual property.&#160; By \u00e2\u20ac\u0153building in\u00e2\u20ac\u009d and not \u00e2\u20ac\u0153bolting on\u00e2\u20ac\u009d, Microsoft believes that it can provide an end-to-end solution, supported with centralised management for information-centric policies for usage, protection and access.<\/p>\n<p>Under the terms of the agreement, RSA will launch DLP v6.5 later this month with full integration to AD RMS and, as new versions of products come to market eventually the entire infrastructure will make use of the DLP technology.&#160; Customers are able to protect their investment as the core engine and policy formats exist today and, as the core DLP technologies are adopted into the Microsoft platform, RSA will continue to develop complimentary products (e.g. advanced management consoles).<\/p>\n<p>Microsoft were unwilling to disclose any further details of their roadmap for integrating the DLP product into their products but did comment that <a href=\"http:\/\/code.msdn.microsoft.com\/mag200812Geneva\">the claims-based identity platform codenamed Geneva (formerly Zermatt)<\/a> is a key part of Microsoft\u00e2\u20ac\u2122s identity strategy and that there would be clear advantages in using <a href=\"http:\/\/www.microsoft.com\/net\/windowscardspace.aspx\">Windows CardSpace<\/a> to unlock business to consumer (B2C) scenarios for data exchange.&#160; There was also a hint that management would be possible from RSA\u00e2\u20ac\u2122s products and from the <a href=\"http:\/\/www.microsoft.com\/forefront\/stirling\/\">Forefront integrated security system product (codenamed Stirling)<\/a>.<\/p>\n<p>All in all, this is a positive step on the part of Microsoft and EMC\/RSA.&#160; What remains to be seen is how willing business and Government customers are to invest in protecting their data.&#160; Right now we have a business problem and a technology solution but it seems to me there is an apparent lack of desire to implement the technology and supporting processes.&#160; Let\u00e2\u20ac\u2122s hope that by integrating technologies like DLP into the core IT infrastructure, our personal details can remain confidential as we increasingly collaborate online.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mention Microsoft and security in the same sentence and most people will scoff but these day\u00e2\u20ac\u2122s it really a bit unfair\u00e2\u20ac\u00a6 Windows security has come a long way (it still has a way to go too) but nevertheless, many of the customers that I deal with run third party solutions (often at great cost) rather &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">How Microsoft and RSA plan to protect our sensitive data<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[11,1],"class_list":["post-1306","post","type-post","status-publish","format-standard","hentry","tag-drm","tag-microsoft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Microsoft and RSA plan to protect our sensitive data - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Microsoft and RSA plan to protect our sensitive data - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"Mention Microsoft and security in the same sentence and most people will scoff but these day\u00e2\u20ac\u2122s it really a bit unfair\u00e2\u20ac\u00a6 Windows security has come a long way (it still has a way to go too) but nevertheless, many of the customers that I deal with run third party solutions (often at great cost) rather &hellip; Continue reading How Microsoft and RSA plan to protect our sensitive data\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2008-12-04T17:47:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2008-12-19T18:52:15+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/12\\\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/12\\\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"How Microsoft and RSA plan to protect our sensitive data\",\"datePublished\":\"2008-12-04T17:47:05+00:00\",\"dateModified\":\"2008-12-19T18:52:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/12\\\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm\"},\"wordCount\":732,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Digital Rights Management\",\"Microsoft\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/12\\\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/12\\\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/12\\\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm\",\"name\":\"How Microsoft and RSA plan to protect our sensitive data - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2008-12-04T17:47:05+00:00\",\"dateModified\":\"2008-12-19T18:52:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/12\\\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/12\\\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2008\\\/12\\\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Microsoft and RSA plan to protect our sensitive data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Microsoft and RSA plan to protect our sensitive data - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm","og_locale":"en_GB","og_type":"article","og_title":"How Microsoft and RSA plan to protect our sensitive data - markwilson.it","og_description":"Mention Microsoft and security in the same sentence and most people will scoff but these day\u00e2\u20ac\u2122s it really a bit unfair\u00e2\u20ac\u00a6 Windows security has come a long way (it still has a way to go too) but nevertheless, many of the customers that I deal with run third party solutions (often at great cost) rather &hellip; Continue reading How Microsoft and RSA plan to protect our sensitive data","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm","og_site_name":"markwilson.it","article_published_time":"2008-12-04T17:47:05+00:00","article_modified_time":"2008-12-19T18:52:15+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"How Microsoft and RSA plan to protect our sensitive data","datePublished":"2008-12-04T17:47:05+00:00","dateModified":"2008-12-19T18:52:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm"},"wordCount":732,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Digital Rights Management","Microsoft"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm","name":"How Microsoft and RSA plan to protect our sensitive data - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2008-12-04T17:47:05+00:00","dateModified":"2008-12-19T18:52:15+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"How Microsoft and RSA plan to protect our sensitive data"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1164,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/08\/microsoft-infrastructure-architecture-considerations-part-5-security.htm","url_meta":{"origin":1306,"position":0},"title":"Microsoft infrastructure architecture considerations: part 5 (security)","author":"Mark Wilson","date":"Tuesday 26 August 2008","format":false,"excerpt":"Continuing the series of posts on the architectural considerations for designing a predominantly-Microsoft IT infrastructure, based on the MCS Talks: Enterprise Infrastructure series, in this post I\u00e2\u20ac\u2122ll look at some of the infrastructure architecture considerations relating to security. The main security challenges which organisations are facing today include: management of\u2026","rel":"","context":"In \"Architecture\"","block_context":{"text":"Architecture","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/architecture"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2450,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/08\/a-call-for-open-standards-in-digital-rights-management.htm","url_meta":{"origin":1306,"position":1},"title":"A call for open standards in digital rights management","author":"Mark Wilson","date":"Friday 3 August 2007","format":false,"excerpt":"Digital rights management (DRM) is a big issue right now. Content creators have a natural desire to protect their intellectual property and consumers want easy access to music, video, and other online content. The most popular portable media player is the Apple iPod, by far the most successful digital music\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":834,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/07\/the-microsoft-novell-alliance-good-bad-or-ugly.htm","url_meta":{"origin":1306,"position":2},"title":"The Microsoft-Novell alliance &#8211; good, bad or ugly?","author":"Mark Wilson","date":"Monday 9 July 2007","format":false,"excerpt":"A few weeks back, I attended a Novell webcast about last year's Novell-Microsoft collaboration agreement. Although that particular event was for partners, I've since found that the same presentation is available to a wider audience so I'm not breaching any NDAs by writing a bit more here about what this\u2026","rel":"","context":"In \"Linux\"","block_context":{"text":"Linux","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/linux"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":675,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm","url_meta":{"origin":1306,"position":3},"title":"Microsoft&#8217;s digital identity metasystem","author":"Mark Wilson","date":"Monday 17 July 2006","format":false,"excerpt":"After months of hearing about Windows Vista eye candy (and hardly scraping the surface with anything of real substance with regards to the operating system platform), there seems to be a lot of talk about digital identity at Microsoft right now. A couple of weeks back I was at the\u2026","rel":"","context":"In \"Microsoft\"","block_context":{"text":"Microsoft","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/microsoft"},"img":{"alt_text":"","src":"http:\/\/www.tqlkg.com\/image-1875354-8132995","width":350,"height":200},"classes":[]},{"id":1784,"url":"https:\/\/www.markwilson.co.uk\/blog\/2010\/04\/microsoft-solution-accelerators.htm","url_meta":{"origin":1306,"position":4},"title":"Microsoft Solution Accelerators","author":"Mark Wilson","date":"Thursday 22 April 2010","format":false,"excerpt":"Microsoft's Solution Accelerators have been around for a while now and, as the name suggests, are intended to accelerate the deployment of solutions built on Microsoft technology.\u00c2\u00a0 Each solution accelerator is a free download from the Microsoft website but they don't seem to be as well-known as they should be\u2026","rel":"","context":"In \"Microsoft\"","block_context":{"text":"Microsoft","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/microsoft"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":84,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/04\/look-at-microsoft-host-integration.htm","url_meta":{"origin":1306,"position":5},"title":"A look at Microsoft Host Integration Server 2004","author":"Mark Wilson","date":"Wednesday 20 April 2005","format":false,"excerpt":"I began my IT career in the mainframe world. I got my first taste as a 16 year-old schoolboy on a work experience placement (changing tapes on ICL 1900 mainframes at the local hospital) and then as part of my Computer Studies degree I joined ICL, a name now consigned\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1306"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1306\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}