Biometrics will not be the sole technology being used for authentication, and it shouldn't be. Security is about adding layers, it's not about substituting technology, ... The human element [in security] is extremely important [and is achieved by] a combination of biometrics, identity, and smart card technology. |
In the compliance area, customers want converged solutions that encompass system, identity, access and security event management. |
It comes down to checking the endpoints with a client to see if they are compliant with a policy that says they are safe to be admitted to the network. |
just ensures that the unscrupulous companies that are . . . violating people's privacy [through secret monitoring] are reined in. |
Securing the 'endpoints' of a corporate network is a challenge that affects all enterprises. Companies are looking for integrated offerings that can both protect the network and ensure that endpoints are compliant with security policies. This acquisition will give customers a complete endpoint compliance solution while helping to reduce complexity and cost. |
The increasing popularity of e-commerce is contributing to the growth of firewalls. |
Unless you're big enough, biometrics can become prohibitively expensive. |
We've felt for sometime that IM is next big wave. If you claim to offer a total messaging solution, you have to have a solution for IM. |
What we're talking about are interoperable security credentials, ... You need to create a bridge to support a heterogeneous environment, and that's something Microsoft doesn't do. |
When building a comprehensive security infrastructure, organizations need to utilize technologies that are interoperable and seamlessly integrated, |