Compaq 307560-001 Compaq Enterprise Security Framework - Page 16

Security Market: Proliferation/Limitation of Security Offerings

Page 16 highlights

WHITE PAPER (cont.) ... 1995 to $1.4 billion in 2000. In order to provide a total solution, systems companies will need to develop or acquire software expertise. - Change Issues - n Security products are adding/improving functionality at a rapid rate n Important standards remain undetermined n Cryptography laws are unsettled n Interoperability problems - Customer Decisions - n Selected hardware is essential for strength and performance of security n Software products are easier/less costly to update n Software products can bridge point products to create complete solutions Enterprise security solutions will be integrated hardware and software solutions Figure 11 Hardware will also remain a critical element in resolving security issues. For example, ECommerce applications using SET will require multiple public-key encryption operations per transaction, potentially slowing existing servers to a crawl. Specialized hardware will be necessary to alleviate this problem. In addition, smartcards and tokens can provide robust, high-performance encryption solutions on the desktop, and can be used as a tool for secure transactions with a multitude of new (inter-) networked applications. As a result, enterprises will require integrated solutions. Security Market: Proliferation/Limitation of Security Offerings As the networked computing environment has grown, there has been a corresponding explosion in the number and variety of security offerings from a diverse array of companies. While these solutions aim to provide a comprehensive security solution for enterprises, they have, for the most part, lacked a practical orientation. Additionally, they have substantial interoperability and ease-ofuse issues. In the last 12 months, we have witnessed the rapid growth of security offerings. Vendors are now producing products in all of the major market segments and expanding the functionality of their offerings to encompass other product categories. Figure 12 shows a small sample of the companies offering solutions in various segments. 16

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21

W
HITE
P
APER
(cont.)
16
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1995 to $1.4 billion in 2000. In order to provide a total solution, systems companies will need to
develop or acquire software expertise.
Figure 11
Hardware will also remain a critical element in resolving security issues. For example, E-
Commerce applications using SET will require multiple public-key encryption operations per
transaction, potentially slowing existing servers to a crawl. Specialized hardware will be necessary
to alleviate this problem. In addition, smartcards and tokens can provide robust, high-performance
encryption solutions on the desktop, and can be used as a tool for secure transactions with a
multitude of new (inter-) networked applications. As a result, enterprises will require integrated
solutions.
Security Market: Proliferation/Limitation of Security Offerings
As the networked computing environment has grown, there has been a corresponding explosion in
the number and variety of security offerings from a diverse array of companies. While these
solutions aim to provide a comprehensive security solution for enterprises, they have, for the most
part, lacked a practical orientation. Additionally, they have substantial interoperability and ease-of-
use issues.
In the last 12 months, we have witnessed the rapid growth of security offerings. Vendors are now
producing products in all of the major market segments and expanding the functionality of their
offerings to encompass other product categories. Figure 12 shows a small sample of the companies
offering
solutions in various segments.
n
Security products are adding/improving
functionality at a rapid rate
n
Important standards remain undetermined
n
Cryptography laws are unsettled
n
Interoperability problems
n
Selected hardware is essential for strength
and performance of security
n
Software products are easier/less costly to
update
n
Software products can bridge point products
to create complete solutions
— Change Issues —
— Customer Decisions —
Enterprise security solutions will be integrated hardware
and software solutions