sponsored by Torry Harris Business Solutions
Posted:  03 Mar 2009
Published:  03 Mar 2009
Format:  PDF
Length:  21  Page(s)
Type:  White Paper
Language:  English

It is estimated that 90% of most external attacks on applications take advantage of known vulnerabilities and misconfigured systems. While it is unlikely that one could develop 100% secure applications, it may be advisable to analyze vulnerabilities, threats & risks and implement robust security and access-control mechanisms to tackle some of the known, anticipated security threats specifically in SOA initiatives that are increasingly beginning to expose the once secure 'legacy functionality'. Such an approach would not only improve overall system security but also lead to reduced costs (incident response costs, application outage costs, cost of fixing, reputation damage costs, etc.) through increased efficiency and better customer satisfaction levels.

This white paper provides comprehensive guidance on integrating security and access-control best practices into your SOA and WSOA initiatives. It includes the review of topics such as:

  • The different Access control models
  • A meta-model for WSOA (Web service-oriented architecture)
  • Goals of SOA Security
  • SOA Security implementation models
  • Industry standards for SOA Security
  • SOII (Service-Oriented Information Integration), standards for SOII

Application Integration | Application Life-Cycle Management | Business Process Management | Endpoint Security | Network Security | SOA

View All Resources sponsored by Torry Harris Business Solutions

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement