Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    RSA Conference 2002: Where FUD Gets Down to Business

    Written by

    Cameron Sturdevant
    Published February 27, 2002
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The RSA Conference, one of the longest-running computer security shows, was held in San Jose, Calif., during the week of Feb. 18-22. It was a witches brew of federal money, a rowdy crowd of nervous-but-not-showing-it second-tier players, serene market leaders, and circling, savvy IT security managers.

      According to President Bushs 2003 budget proposal, IT spending by the federal government will jump another $7 billion, to $52 billion, most of which is meant to boost so-called homeland security. At the RSA conference, it looked more like a New Deal program for high-tech security companies.

      On the show floor I saw a plethora of “security solutions” maneuvering for visibility in front of government agencies and merger-minded big players. After talking with nearly 30 different companies over three days, it became clear that many of the showy second-tier companies are exploiting potential or real weaknesses in market leaders to get mind space.

      For example, one interesting company, TippingPoint Technologies, touted its 3-in-1 intrusion detection, firewall and vulnerability assessment tool that runs on a proprietary OS. TippingPoint couples the product with a vulnerability update service. This is a direct challenge to established companies such as NetScreen that uses ASIC-based technology to get blisteringly fast performance, but can be relatively slow when it comes to updating new attack profiles.

      TippingPoint also rattles the cage of Check Point Software Technologies FireWall-1, a software-based product that is widely used even though its often beaten in straight performance tests.

      Name dropping

      Market leaders RSA Security, Netegrity and Internet Security Systems were mentioned in nearly every interview I conducted. At the show, these companies were placid in the face of the rabble, but all are clearly thinking about the technology challenges facing IT managers. For one thing, the implementation and education sessions I attended were packed with savvy IT staff who asked thoughtful questions about the best way to plan for security in a wireless network and about upcoming standards development, again, especially concerning wireless networks, which are areas that are still emerging turf.

      There are still plenty of companies vying to answer IT managers tough questions with their products. For example, there were at least 11 companies hawking user identity management products (including Authenex, Authentica, Authentify, BioPassword Security Systems, Bridgewater Systems, Business Layers, Courion, Digital Signature Trust, IBM, Iridian Technologies, Novell, Oblix and Passlogix). There were also at least five smart-card vendors (ActivCard, Datacard Group, Datakey, Gemplus and SchlumbergerSema) and an innumerable swarm of VPN hardware and software products.

      Nearly all vendors were talking about services in addition to their products, in part because integrating security into existing networks is quite difficult, but also because security vendors are discovering that they need an ongoing revenue stream to stay in business.

      The conference was also swirling with more informal themes, including what to do about wireless, personal privacy, attack mitigation, the role of litigation in security (and it is coming on strong), identity management and whats the best way to implement crypto.

      My advice is to think back to Sept. 10. What were your biggest security concerns then? For most IT managers, those should be the biggest concerns today.

      As I packed up my laptop and tape recorder, I left the show with a mix of feelings. On one hand, its always a good thing to cover a maturing technology that has real value for IT managers and that lends itself to hard-science analysis (using X amount of computing power for Y hours will break Z level of encryption).

      On the other hand, seeing so many distrustful people gathered together at an event designed to promote fear, uncertainty and doubt made it clear that eWeeks coverage (we had two news reporters and two technical analysts covering the event) was needed to bring a practical perspective to bear on the subject.

      Senior Analyst Cameron Sturdevant can be contacted at [email protected].

      Cameron Sturdevant
      Cameron Sturdevant
      Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at [email protected].

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.