Gary Rowe, CEO, Principal Consulting Analyst
Gary Rowe is a seasoned technology analyst, consultant, advisor, executive and entrepreneur. Mr. Rowe helped architect, build and sell two companies and has been on the forefront the standardization and business application of core infrastructure technologies over the past 35 years. Core areas of focus include identity management, meta-directories, cloud computing, security/risk management, messaging, privacy and personal clouds.
He was President of Burton Group from 1999 to 2010, the leading technology infrastructure research and consulting firm. Mr. Rowe grew Burton to over $30+ million in revenue on a self-funded basis, sold Burton to Gartner in 2010 and supported the acquisition as Burton President at Gartner.
Mr. Rowe has personally led over 100 consulting engagements, 50+ educational seminars, published over 20 research reports/articles and led three significant technology industry initiatives. His combination of business skills and his deep understanding of technology provides a balanced perspective for clients.
- Identity and Access Management (IAM)
- Internet of Things (IoT)
- The Future of Identity Management
Recently Published Research
Privacy Beyond Compliance
- The relationship between privacy-related sunk costs and overall enterprise information system integrity
- The value of looking at privacy issues through the broader enterprise risk lens
- The opportunity to convert privacy costs into positive business outcomes
- The value of focusing on socio-technical system reliability
- Integrating privacy costs into the overall enterprise risk planning
The End of EA and IT As We Know IT
- The relationship between EA and the ever-increasing IT complexity
- Is the tight coupling between Enterprise Strategic Planning and EA good or bad?
- Why large IT frameworks have failed to produce useful measurable business results
- What is Enterprise Architecture in the age of consumerization/cloud?
- Should EA become Enterprise IT Product Managers?
- Why EA should be about extracting the maximum advantage for the enterprise, scratching out competitive advantage by the sum is greater that the component parts
- What the new Enterprise IT World looks like and how EA must evolve to stay relevant
The Future of Identity Management
Despite the decades of investment and hard work, many organizations face greater identity management challenges today than they did 15 years ago. Today, many organizations struggle with a hodge-podge of silo’d, poorly or non-interoperable IAM functions that are impossible to govern properly and are hindering proper risk management.
This highly actionable report supports our clients as they develop five-year technology infrastructure plans. In this report we make specific projections as to where we believe Identity Management will be going over the next five years and we describe a model for identity abstraction that provides an extensible services oriented architecture.
To provide our clients with the most comprehensive view of Identity Management, we augment our own expertise with the insights of what we consider to be the top thought leaders and industry experts to deliver the most comprehensive perspective on the Future of Identity Management.
TVR Crosstalk Report: Identity and Data Governance
- The evolution of identity data as its own domain
- The impact of silos on identity data management
- The potential of virtual directories as an identity data management approach
- The impact of data reuse on identity and the resulting authenticity decay
- Identity data governance: is built on a foundation of quicksand
There are things organizations can be doing today to address these concerns. Specifically, this report discusses a five-step program for identity data governance based upon the team’s experience working with data and identity in F1000 enterprise.
Internet of Things (IoT) Reality Check
Blockchain Level Set
- Blockchain 101 – Separating the hype from the reality
- Blockchain in the enterprise: What? Why? When? and How?
- Detailed discussion of enterprise Blockchain use cases