SlideShare a Scribd company logo
1 of 5
Download to read offline
www.pwc.com



Internal Control
Considerations
Introduced by
Middleware Technologies


ISACA Monthly Meeting
13 October 2011
UBS Tower
Agenda
• Purpose & Motivation             • Summary Advantages /
• Defining Middleware                Disadvantages

• Features & Examples              • ERP Examples – SAP, Oracle

• Evolution & History              • Risks (WCGW)

• Measurable Qualities             • Candidate Internal Controls

• CORBA                            • Q&A

• RPC/ORB
• Publish/Subscribe
• Message Queuing
• TP (transaction processing) Monitors




PwC                          Tuesday, October 18, 2011             2
Purpose & Motivation


Why should we care about middleware?


• High adoption rate among companies
• Hidden dangers
• Difficulties in assessing the risks




PwC                              Tuesday, October 18, 2011   3
What is Middleware?


• Software that is designed to help build large scale distributed
  systems.
• Software that sits between systems.
• In strict technical terms, middleware is transport software that is
  used to move information from one program to one or more other
  programs, shielding the developer from dependencies on
  communication protocols, operating systems, and hardware
  platforms.
• Middleware allows isolated systems to “talk” to one another.
• Roughly half of IT budgets are spent on enabling systems to
  communicate with one another.




PwC                            Tuesday, October 18, 2011                4
Please contact me at kumar.setty@us.pwc.com for the entire
presentation.




PwC                           Tuesday, October 18, 2011      5

More Related Content

Viewers also liked

Technology and education
Technology and educationTechnology and education
Technology and educationjessicalynch
 
Teaching Computers to Think Like Decision Makers: the next revolution in the ...
Teaching Computers to Think Like Decision Makers: the next revolution in the ...Teaching Computers to Think Like Decision Makers: the next revolution in the ...
Teaching Computers to Think Like Decision Makers: the next revolution in the ...Lorien Pratt
 
Conquering Complexity
Conquering ComplexityConquering Complexity
Conquering ComplexityLorien Pratt
 

Viewers also liked (9)

Australian animals by Micah
Australian animals by MicahAustralian animals by Micah
Australian animals by Micah
 
Technology and education
Technology and educationTechnology and education
Technology and education
 
Mass.
Mass.Mass.
Mass.
 
Slid 1
Slid 1Slid 1
Slid 1
 
Armenia
ArmeniaArmenia
Armenia
 
Need a job
Need a jobNeed a job
Need a job
 
Massachusetts power point
Massachusetts power pointMassachusetts power point
Massachusetts power point
 
Teaching Computers to Think Like Decision Makers: the next revolution in the ...
Teaching Computers to Think Like Decision Makers: the next revolution in the ...Teaching Computers to Think Like Decision Makers: the next revolution in the ...
Teaching Computers to Think Like Decision Makers: the next revolution in the ...
 
Conquering Complexity
Conquering ComplexityConquering Complexity
Conquering Complexity
 

Similar to Internal Control Considerations Middleware Technologies2

The differing ways to monitor and instrument
The differing ways to monitor and instrumentThe differing ways to monitor and instrument
The differing ways to monitor and instrumentJonah Kowall
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin TexasJoeFaghani
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Assessing Technology Landscape
Assessing Technology LandscapeAssessing Technology Landscape
Assessing Technology LandscapeComputing Cage
 
ASAS 2014 - Simon Brown
ASAS 2014 - Simon BrownASAS 2014 - Simon Brown
ASAS 2014 - Simon BrownAvisi B.V.
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice ArchitectureEngin Yoeyen
 
Why Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceWhy Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceGlobal Knowledge Training
 
How AI and ML Can Accelerate and Optimize Software Development and Testing
How AI and ML Can Accelerate and Optimize Software Development and TestingHow AI and ML Can Accelerate and Optimize Software Development and Testing
How AI and ML Can Accelerate and Optimize Software Development and TestingAggregage
 
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...AgileNetwork
 
Ema kognitio comparative analysis webinar slides
Ema kognitio comparative analysis webinar slidesEma kognitio comparative analysis webinar slides
Ema kognitio comparative analysis webinar slidesKognitio
 
Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWebJosep Arroyo
 
Building a Real-Time Security Application Using Log Data and Machine Learning...
Building a Real-Time Security Application Using Log Data and Machine Learning...Building a Real-Time Security Application Using Log Data and Machine Learning...
Building a Real-Time Security Application Using Log Data and Machine Learning...Sri Ambati
 
Soma_Mishra_Resume
Soma_Mishra_ResumeSoma_Mishra_Resume
Soma_Mishra_Resumesoma mishra
 
Oracle Management Cloud - introduction, overview and getting started (AMIS, 2...
Oracle Management Cloud - introduction, overview and getting started (AMIS, 2...Oracle Management Cloud - introduction, overview and getting started (AMIS, 2...
Oracle Management Cloud - introduction, overview and getting started (AMIS, 2...Lucas Jellema
 

Similar to Internal Control Considerations Middleware Technologies2 (20)

The differing ways to monitor and instrument
The differing ways to monitor and instrumentThe differing ways to monitor and instrument
The differing ways to monitor and instrument
 
BAKKIYA_4YR
BAKKIYA_4YRBAKKIYA_4YR
BAKKIYA_4YR
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
TIRTA ERP
TIRTA ERPTIRTA ERP
TIRTA ERP
 
Assessing Technology Landscape
Assessing Technology LandscapeAssessing Technology Landscape
Assessing Technology Landscape
 
sonal
sonalsonal
sonal
 
ASAS 2014 - Simon Brown
ASAS 2014 - Simon BrownASAS 2014 - Simon Brown
ASAS 2014 - Simon Brown
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice Architecture
 
Why Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceWhy Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD Workforce
 
Mallikarjun_Konduri
Mallikarjun_KonduriMallikarjun_Konduri
Mallikarjun_Konduri
 
How AI and ML Can Accelerate and Optimize Software Development and Testing
How AI and ML Can Accelerate and Optimize Software Development and TestingHow AI and ML Can Accelerate and Optimize Software Development and Testing
How AI and ML Can Accelerate and Optimize Software Development and Testing
 
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
Agile Gurugram 2023 | Observability for Modern Applications. How does it help...
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
Ema kognitio comparative analysis webinar slides
Ema kognitio comparative analysis webinar slidesEma kognitio comparative analysis webinar slides
Ema kognitio comparative analysis webinar slides
 
Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWeb
 
Building a Real-Time Security Application Using Log Data and Machine Learning...
Building a Real-Time Security Application Using Log Data and Machine Learning...Building a Real-Time Security Application Using Log Data and Machine Learning...
Building a Real-Time Security Application Using Log Data and Machine Learning...
 
Soma_Mishra_Resume
Soma_Mishra_ResumeSoma_Mishra_Resume
Soma_Mishra_Resume
 
Oracle Management Cloud - introduction, overview and getting started (AMIS, 2...
Oracle Management Cloud - introduction, overview and getting started (AMIS, 2...Oracle Management Cloud - introduction, overview and getting started (AMIS, 2...
Oracle Management Cloud - introduction, overview and getting started (AMIS, 2...
 
L08 architecture considerations
L08 architecture considerationsL08 architecture considerations
L08 architecture considerations
 

Internal Control Considerations Middleware Technologies2

  • 1. www.pwc.com Internal Control Considerations Introduced by Middleware Technologies ISACA Monthly Meeting 13 October 2011 UBS Tower
  • 2. Agenda • Purpose & Motivation • Summary Advantages / • Defining Middleware Disadvantages • Features & Examples • ERP Examples – SAP, Oracle • Evolution & History • Risks (WCGW) • Measurable Qualities • Candidate Internal Controls • CORBA • Q&A • RPC/ORB • Publish/Subscribe • Message Queuing • TP (transaction processing) Monitors PwC Tuesday, October 18, 2011 2
  • 3. Purpose & Motivation Why should we care about middleware? • High adoption rate among companies • Hidden dangers • Difficulties in assessing the risks PwC Tuesday, October 18, 2011 3
  • 4. What is Middleware? • Software that is designed to help build large scale distributed systems. • Software that sits between systems. • In strict technical terms, middleware is transport software that is used to move information from one program to one or more other programs, shielding the developer from dependencies on communication protocols, operating systems, and hardware platforms. • Middleware allows isolated systems to “talk” to one another. • Roughly half of IT budgets are spent on enabling systems to communicate with one another. PwC Tuesday, October 18, 2011 4
  • 5. Please contact me at kumar.setty@us.pwc.com for the entire presentation. PwC Tuesday, October 18, 2011 5