Authentication is something you have, something you know, and something you are when you add biometrics, ... I think right now users see [authentication methods] as separate items. The technology is there, but the idea is not. |
Authentication is something you have, something you know, and something you are when you add biometrics. I think right now users see [authentication methods] as separate items. The technology is there, but the idea is not. |
It is designed to give [service providers] and users a better handle on the volumes of data going through their networks so that they can try and stop the bad traffic closer to the source. |
It's possible to prevent these vulnerabilities, but if doing so interferes with what developers feel they need in terms of features, then the features will come first and the security will come second, |
One of the key UTM trends we identified was the evolution of security appliance form factors as the standalone 'black box' is increasingly being replaced by blades and cards for high-performance security switches, ... This evolution is clear in Crossbeam's very successful best-of-breed UTM switches as their fusion of networking and security plays directly into the needs of major enterprises and service providers, a portion of the UTM market where today Crossbeam largely stands alone. |
Physical access, who you are, and [whether or not] you are allowed [specific privileges] is going to be among big technology questions that are going to be answered in 2002, |
Smart cards, USB tokens, and biometrics will be some of the hot areas because companies, organizations, and others are beginning to realize they need to have a better handle on who's coming and going, ... Passwords just don't give you enough confidence in these things. |
Smart cards, USB tokens, and biometrics will be some of the hot areas because companies, organizations, and others are beginning to realize they need to have a better handle on who's coming and going. Passwords just don't give you enough confidence in these things. |
The level of a product's security is inversely proportionate to its position in the marketplace, ... If Linux had a 50 percent market share, you'd see more Linux vulnerabilities exposed. |
You don't want users to play too much. You want distributed firewalls and products and that don't need a lot of human interface. [With hardware], you don't need to worry about support, upgrades, or patching. The software is still on [the] high end but appliances make it easy to fit in, |
You don't want users to play too much. You want distributed firewalls and products and that don't need a lot of human interface. [With hardware], you don't need to worry about support, upgrades, or patching. The software is still on [the] high end but appliances make it easy to fit in. |