[In short, Internet privacy policies offer consumers very little protection.] Six months ago, just having a privacy policy was considered pretty honorable, ... Today, most policies are pretty worthless. |
A lot of security and privacy tends to be reactive, ... Companies will do something until someone finds out about it. Or employees will do something that upper management doesn't know about. As a result, there will be a constant flow of privacy violations. |
At some point it needs to be bigger than the two of them in order to really drive the goals of this endeavor. |
Because of the wide variety of cultural attitudes worldwide and the consumer concern for privacy, there's going to be a very large demand for products that can help you do this. It's clearly shaping up to be an important market, two or three years out. |
Building reliable, dependable and secure e-commerce sites requires massive investments, ... Successful attacks can destroy the most critical aspect of e-commerce-trust. Ensuring the maintenance of trust is one of the primary functions of intrusion detection and vulnerability assessment products. |
I personally think that people are a little bummed that not more happened [for Y2K] - it's very anticlimactic, ... The virus hype around Y2K was pretty intense. Because of that, because it's been so anticlimactic, I think there's a desire to attach anything to Y2K. In terms of what are we going to be seeing over the next couple of weeks, I think we'll see the Trojan horse-type viruses, the viruses that are very much network-based, e-mail-centric, and are typically focused on replicating themselves in an attempt to flood systems or create lots of unwanted mail or messages. |
If you want to see how many bikes shipped in North Dakota last week, when you click on some option in that application, (the question is) how long will it take to respond? |
Intel has a pretty good size network division, and it has a number of products that use various security functions to add value to those network products. |
Once this is rolled out, then they [Cisco] will work with the standards bodies to make that function a standard. |
People are going to buy this stuff without even knowing it. |
The real issue is, who's in control of my online profile, who can access it, and who's selling it? ... When I show up at a travel site, do I want them to know who I am and what frequent flyer program I belong to? Yes. When I'm doing research on AIDS because I have a friend in the hospital, do I want that as part of my profile? I don't think so. |
The real issue is, who's in control of my online profile, who can access it, and who's selling it? When I show up at a travel site, do I want them to know who I am and what frequent flyer program I belong to? Yes. When I'm doing research on AIDS because I have a friend in the hospital, do I want that as part of my profile? I don't think so. |
These aren't functions that people need today, but they're functions that will support where a lot of enterprise customers want to go. |
This is not the first time Cisco has pledged a focus on this market, but this time they are coming to the market with a set of products that are architected and designed specifically for this market segment, |
This is not the first time Cisco has pledged a focus on this market, but this time they are coming to the market with a set of products that are architected and designed specifically for this market segment. |