"We look for your IP address and certain idiosyncrasies of your computer, then we look for the types of transactions that you engage in. We then use those consistencies in those transactions to identify you as the correct user," Coviello said.
Is this "business intelligence" per se, or is it something else? "It's absolutely that," Coviello said. "It's not what I'd call 'artificial intelligence,' but it's a way of taking what's there and using it to protect people."
Information-centric security binds security directly to information and the people who access it to ensure that they can access only the right information at the right time, when and where they need it.
"We are now protecting well over 100 million online identities," Coviello said. "But the next step is to bring the security to information itself, and look for patterns in the flow of information and data. Our tools are sophisticated enough-not to do just dictionary-type content-but to actually screen streams and flows of different data." Security is at a crossroads. Listen to the podcast here.
Another example of finding a pattern in the data itself might involve e-mail security, Coviello said. "Our tools can identify a string of credit card numbers. In an e-mail scan, we would certainly ask, 'Why was a string of credit card numbers headed out of the company in the form of an e-mail?'" Coviello said.
"Ironically, we deployed this within
These issues and many more will be examined when
"We'll talk a lot of about innovation at the show, including dynamic software. But also we'll be talking about how much security is being built right into IT infrastructure, like embedding encryption into storage platforms and the like," Coviello said.
"We'll see some new innovations around static security, like firewalls and standard virus protection also, but those things are just not keeping pace right now."