Banks do not want to put security procedures in place that may discourage users from using their services. |
Hackers are now being lured by the promise of financial gains. |
Hackers focus on the weakest link in the security chain. |
In Apple's case, you can credit the media and all those folks who said the [OS X] platform was inherently secure [for drawing attention to it]. |
Many financial institutions had been moving toward stronger authentication, so they should have time to make the necessary changes. |
Symantec is a big buyer. The acquisitions have been critical not just to Symantec, which has been using it to stay ahead in the game, but also for the ecosystem of startups that the M&A strategy helps sustain. |
The challenge for Check Point is to get beyond the perimeter. They went out to the endpoint. Now, they have to defend the core, and when you do that, you need to look at more passive monitoring solutions. |
The lesson here is you can't expect users to learn. There's too much fun going on out there on the Internet. |
The lesson here is you can't expect users to learn. There's too much fun going on out there on the Internet. |
The new idea is a lot like a wolf in sheep's clothing. |
There are a lot of aggressive acquisitions going on in this space and Check Point is at risk of getting left behind if they don't develop their own offerings or make an acquisition. |