Hot Topics in Tech Security

Share it on Twitter  
Share it on Facebook  
Share it on Linked in  

What are the hot topics and trends with enterprise customers? Where are they putting their resources? Executives at the RSA Security Conference in San Jose, Calif., last week said the answer depends on who's doing the talking.

Richard Palmer of Cisco Systems's security technology group said SSL-based VPNs are very hot.

In the firewall space, he's detecting deeper interest in inspection technologies and a greater focus on looking at security on a systemic-based system on the hosting and networking sides.

"All these are integrated into services. The growth is spread out across many product areas and focused on innovating in these areas," he said during a panel discussion during the RSA Security conference here.

Mike Nash, corporate vice president of the Microsoft security technology unit, said customers are responding positively to Microsoft's progress in making Windows more secure.

"The interest now is in more aspirational scenarios that require a higher level of trust, such as authentication and authorization," he said.

The top security priorities for Microsoft? Nash said they include delivering security improvements in both the next version of Windows Vista and its Longhorn server suites.

At the same time, we're making sure we improve core platform capabilities, such as isolation, anti-malware technology and better network isolation, he added.

"We're doing a lot of work around making sure Kerberos (define) is a native and pervasive part of the Windows platform, and especially in depending on multi-factor authentication."

Looking ahead at next year, Thomas Noonan, chairman and CEO of Internet Security Systems (ISS), said the next-generation approach to security is seeping into vendors' wares.

"I think one of the things we'll see is an ability to actually feed these various products across the enterprise with live services. I don't mean patches that provide new [security] signatures, but on-demand services that bring the security infrastructure to life in extensible ways that had not been capable before."

This article was first published on InternetNews.com. To read the full article, click here.