{"id":2130,"date":"2006-05-02T00:00:00","date_gmt":"2006-05-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/02\/eager-it-leaders-could-swallow-security-industry\/"},"modified":"2021-12-30T11:40:45","modified_gmt":"2021-12-30T11:40:45","slug":"eager-it-leaders-could-swallow-security-industry","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/02\/eager-it-leaders-could-swallow-security-industry\/","title":{"rendered":"Eager IT Leaders Could Swallow Security Industry"},"content":{"rendered":"<p>With industry experts predicting a wave of consolidation across the security applications sector, the continued efforts of the IT industry&#8217;s largest players to bake more defense features into their products could accelerate the rapid shifts in the market.  In others, as with Intel&#8217;s recently announced vPro line of processors, companies have sketched out plans for features that could even eliminate the need for some types of security applications in the future.  While few experts say they believe those efforts, or Microsoft&#8217;s pledge to deliver a far more secure operating system with integrated security tools in its next-generation Windows Vista, will push major network defense and anti-malware software companies out of business, industry watchers say there is little doubt that the work will have a long-term impact on smaller players and the sector as a whole.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;I think some people were still scratching their heads when we bought Authentica, but certainly not our customers,&#8221; said Dennis Hoffman, EMC&#8217;s vice president of information security for EMC, based in Hopkinton, Mass.  &#8220;Customers are asking all the major platform providers to build security into their technologies, and we will absolutely invest, partner and when possible, acquire, to continue to build out information security in our own products.&#8221;<\/p>\n<p>Hoffman said enterprises will likely always seek some form of help from independent, third-party security applications vendors, but that he believes end users have tired of the need to acquire additional technologies for protecting almost every form of IT.<\/p>\n<p>Some analysts are predicting that the trend toward large IT platform providers developing greater security features will only accelerate a torrent of industry consolidation among anti-malware and network defense applications makers that could already be overdue.<\/p>\n<p>http:\/\/www.eweek.com\/article2\/0,1759,1956656,00.asp?kc=EWRSS03119TX1K0000594<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2130","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2130"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2130\/revisions"}],"predecessor-version":[{"id":4617,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2130\/revisions\/4617"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}