First, our focus on security is on the infrastructure itself. So it is all about how you protect the network, the device, and the application that is riding on the server. John W. Thompson applicationdevicefocus Change image and share on social
One of the things that has been truly incredible to observe though, is the amount of venture investment that has gone into early stage security technology. John W. Thompson amountearlyincredible Change image and share on social
The thing we have to be careful of is that the Internet is a global communications medium, and if one country tips the balance in regulating its use or regulating what companies or individuals do on the web, it could have an economic impact that might be unintended, quite frankly, by the regulations themselves. John W. Thompson balancecarefulcommunication share on social
Over the near term there is clearly the opportunity to work with Microsoft to do to a better job of creating a more secure Windows experience for users around the world. John W. Thompson createexperiencejob Change image and share on social
While there have been terrific advances in the state of technology around heuristics, behavior blocking, and things like that, technology is only a part of the approach to solving the problem with the more important aspect involving putting the right process in place. John W. Thompson advanceapproachaspect share on social
We need to shift the paradigm from reactive technologies to more integrative solutions that deal with the variety and complexity of the threats that are out there today. John W. Thompson complexitydealintegrative Change image and share on social
We think the managed security services opportunity is enormous and so we have been an active participant and probably the largest firm in this space outside of an IBM or EDS, which does large outsourcing contracts. John W. Thompson activecontractenormous share on social
The U.S. and Israel probably lead the way in terms of venture investment in technologies companies focused on the security paradigm. That is quite encouraging. John W. Thompson companyencouragefocus Change image and share on social
Right now we have a closure rate between discovery and exploitation of four to six months. We need to be more in the realm of seven to 10 days. That is an enormous challenge. John W. Thompson challengeclosureday Change image and share on social
What the Snowden scenario proved is that the weakest link is not the technology, the weakest link is the individual; we shouldn't kid ourselves. John W. Thompson individualkidlink Change image and share on social