As proof, Dusche pointed to the smart cards issued to Microsoft employees for network and security access.
By the times the Games arrive this will have grown to 900 servers, 1, 000 network and security devices and 9, 500 computers.
To that picture, you have to add the entire context of cyber security, or Network and Information Security in the Digital Agenda for Europe.
FORBES: The EU's 'Right To Be Forgotten': What Data Protections Are We Missing in the US?
Customers generally tend to buy an entire solution to meet their network infrastructure requirements, and Cisco has capitalized on its ability to deliver both core network equipment and security products.
FORBES: Cisco Plugs Into Network Security Business, Stock Eyes $24
In most organizations there are different staffs for endpoint security and network security.
Most attempts to sell in to both network and host security spaces do not do well.
Apple recently made headlines by acquiring AuthenTec, a network and cloud security company with fingerprint identification technology.
As much as dominant vendors like Cisco and Microsoft would like you to believe there are no security benefits from coupling host and network security.
Together we surfaced opportunities in areas where innovation might deliver greater value at lower cost such as network sharing, network (and security) operations centers, and wireless applications.
The European Network and Information Security Agency (ENISA) has been working on a framework that sees data protection as a basic human right, a protection that is offered to consumers within a social context.
FORBES: The EU's 'Right To Be Forgotten': What Data Protections Are We Missing in the US?
As I mentioned above there is little doubt that demand is growing for those network and computer security companies as consumers and businesses both embrace things like bring your own device (BYOD), cloud and web based computing and the shift from PCs to tablets.
FORBES: Smartphones, Tablets, The Cloud And Guns - All Growth Markets
"I believe that as we increase our dependency on Internet of Things, and because it is not a fully stable technology per se, the probability of having problems increases, " says Evangeis Ouzounis, the head of the secure infrastructure and services unit at the European Network and Information Security Agency.
Brian Moore, senior lecturer in ethical hacking and network security at Coventry University, said the general perception of how cyber criminals operated had been "glamourised and completely falsified by the likes of shows like CSI and NCIS".
Putting the bulk of computing and storage in the data center has other perks for IT management: It creates a centralized location for software upgrades across an entire organization and puts a layer of network security between users and sensitive data--a lost thin client laptop, for instance, doesn't contain private information, and so doesn't pose a threat of causing a data breach.
But currently, the more common concerns for users lie in wi-fi's cost, patchy coverage and network security.
Another part is rooted in the network of alliances and security relationships we have created with other nations.
CENTERFORSECURITYPOLICY: Transforming the United States Global Defense Post
The networks and network security sectors, the latter an area where Juniper is very active, have seen their share of recent consolidation activity.
The report notes that GCHQ created something called the Network Defence Intelligence and Security Team (NDIST) in September 2008, to respond to this dual threat.
FORBES: UK Intel Fingers Biggest Cyber Threats To National Security
Palo Alto Networks, which plans to list on the New York Stock Exchange under the ticker PANW, provides network security and a firewall product.
"But a great deal of it concerns our most sensitive systems, including aircraft avionics, surveillance technologies, satellite communications systems, and network security protocols, " he said.
Instead of talking about cars, these geeks were showing off their aptitude in technology, talking about things like cloud computing, network security and advanced communications systems.
FORBES: Influx of Nerds Changes Tenor of Auto Industry's Summer Camp
"Just as soon as I did, I knew I shouldn't have, " says Mr. Fees, who quickly unplugged his ThinkPad from the network and called his security team.
WSJ: You Won't Believe How Adorable This Kitty Is! Click for More!
There are no technical synergies between host and network security.
This revenue number includes antivirus, antimalware and network-security software.
All of this technological progress creates a more flexible work environment and contributes to a healthy work-life balance, but it poses a serious challenge to IT professionals, who face a new set of threats to data and network security.
FORBES: Securing Corporate Data In An Increasingly Mobile World
Within information technology, the one bright spot has been network security and Perry says the companies to buy are Symantec (nasdaq: SYMC - news - people ) and Safenet (nasdaq: SFNT - news - people ), which has deals with the Department of Defense and Microsoft (nasdaq: MSFT - news - people ).
In fact, when I spoke with Richard Bejtlich, chief security officer at Mandiant and a well-known author and blogger on network security, he argued that APT1 is actually a relatively sloppy group of hackers, and that its mistakes were what part of what allowed Mandiant to profile the unit in such detail.
FORBES: The Shanghai Army Unit That Hacked 115 U.S. Targets Likely Wasn't Even China's 'A-Team'
Systems administrators, network security specialists and help-desk technicians are still in demand, says Mr. Zion.
Which means they are supposed to be largely immune to viruses and other network security threats.
Of course, many IT and project managers are concerned about loss of productivity and compromised network security due to social media use on work computers.
应用推荐