First, our focus on security is on the infrastructure itself. So it is all about how you protect the network, the device, and the application that is riding on the server. John W. Thompson applicationdevicefocus Change image and share on social
The thing we have to be careful of is that the Internet is a global communications medium, and if one country tips the balance in regulating its use or regulating what companies or individuals do on the web, it could have an economic impact that might be unintended, quite frankly, by the regulations themselves. John W. Thompson balancecarefulcommunication share on social
What we are seeing now is customers shifting their attention from security products like firewalls and intrusion sensors, to the policies that need to be in place, and the technologies that help them enforce policy compliance. John W. Thompson attentioncompliancecustomer share on social
We need to shift the paradigm from reactive technologies to more integrative solutions that deal with the variety and complexity of the threats that are out there today. John W. Thompson complexitydealintegrative Change image and share on social
We think the managed security services opportunity is enormous and so we have been an active participant and probably the largest firm in this space outside of an IBM or EDS, which does large outsourcing contracts. John W. Thompson activecontractenormous share on social
The U.S. and Israel probably lead the way in terms of venture investment in technologies companies focused on the security paradigm. That is quite encouraging. John W. Thompson companyencouragefocus Change image and share on social
Right now we have a closure rate between discovery and exploitation of four to six months. We need to be more in the realm of seven to 10 days. That is an enormous challenge. John W. Thompson challengeclosureday Change image and share on social
Second issue is the rapidly accelerating increase in the number of vulnerabilities that get discovered every day. And, equally importantly, is the shortening of time between the discovery of the vulnerability and the release of an exploit. John W. Thompson acceleratedaydiscover share on social
So you will see us continue to advance the state of the art or take information that we have in our response data bases and have that drive automation or an automated response by some of our products. John W. Thompson advanceartautomate Change image and share on social
What the Snowden scenario proved is that the weakest link is not the technology, the weakest link is the individual; we shouldn't kid ourselves. John W. Thompson individualkidlink Change image and share on social