I know, I know, hard to believe, right? Hard to accept that there are interesting things to be said about ITSM, BI and operational reporting that don’t have their alpha and omega right here in Westbury Towers…
Well, I hate to be the one to burst the bubble, but it turns out that someone calling himself BIguru (or is it Big Uru… not sure…) has been blogging about security within Business Objects. BIguru (or Maloy, as he seems to call himself in the real world) has written this piece, which combines a high-level, thematic view of the issues around BO security with specific examples of usage within the BO world. The actual application of security within Business Objects XI r3 is something of a black art which few can hope to understand, so it’s always useful to get a bit of insight from someone who, from the looks of things, is at the coal-face of BO every day.
The issue of security of operational data is, no doubt, going to become more important in the coming weeks, months and years as the world comes to terms with the effects of a financial crisis founded on non-regulation and non-transparency. I have a sneaking suspicion that corporate governance – already a burgeoning pseudo-industry in the noughties – is going to balloon into an obsession at the start of the new decade. Big players are going to bolt down every movable asset and bring in hordes of consultants to define security best practice in order to minimize financial risk wherever possible. And that means that even the weekly workgroup performance report is going to be audited for security soundness, so you need to make sure your understanding of BO security principles is up to snuff.