FireEye, Palo Alto Networks, and new cybersecurity requirements were buzzing at RSA 2013 For many years, the RSA Conference was all about the new new thing. New threats, new compliance mandates, new technologies, etc. At the same time, the industry intelligentsia dismissed staple security technologies like endpoint security and firewalls as boring commodities. Judging by the buzz at RSA 2013, what’s old is new again. Firewall and anti-malware chatter was pervasive throughout the Moscone Center for a number of reasons:1. The old stuff ain’t enough. Network firewalls are essential but no longer adequate alone. In today’s threat landscape and complex internal/external IT architecture, you really do need “contextual awareness” (note: yet another ambiguous industry term) so you can enforce security policies based upon a number of inputs like user, application, device type, etc. As for endpoint security, standard antivirus software also need a booster shot to better detect and block targeted attacks and advanced malware. Lots of enterprises are also looking for some cursory endpoint forensic data collection as well.2. Success breeds new investment. Kudos to Palo Alto Networks for uncovering a new firewall requirement, delivering an innovative solution, and executing in the field. Similar accolades for Fire Eye, a company running 120 MPH in the Advanced Malware Detection/Prevention (AMD/P) space. Given this success, venture capital money flowed back into the cybersecurity world as VCs funded new startups to jump into the market. Think Bromium, Damballa, Invincea, Malwarebytes, Stonesoft, etc. 3. Market share leaders were forced to play defense and react. I estimate that about .60 to .70 cents of every security dollar is spent on either endpoint or network security. These are multi-billion dollar markets where incumbent players have grown phat and a bit complacent. All of a sudden Palo Alto and FireEye success disrupted their comfy oligopoly forcing market leaders to react quickly. On the firewall side, Barracuda, Check Point, Cisco, Dell (SonicWall), Fortinet, Juniper, and Sourcefire now offer their own “next-generation firewall.” Endpoint security vendors remain behind so I expect to see a wave of integrated solutions, new product announcements and M&A activity soon.While vendors scramble to establish positions or defend customer bases, users benefit from a much-needed wave of information security innovation and architectural integration. For example, McAfee introduced “sandboxing” technology to compete with FireEye but also integrated its AMD/P functionality with existing web security, email security, and endpoint security. On the networking side, Check Point, Fortinet, Juniper, and Sourcefire discussed device/software and cloud intelligence integration for next-generation network security. As for pioneers FireEye and Palo Alto, they face stiffer competition but neither is standing still. Both companies are leveraging their momentum to establish partnerships while engineering teams dig into security research and new security controls across the network.In my humble opinion, there is a lesson to be learned here. Unlike other areas of IT, cybersecurity is not about speeds-and-feeds alone. New threats and user requirements will always open doors for innovators to improve upon the status quo and reignite a “commodity” market. Clearly FireEye and Palo Alto’s impact is having this effect as evidenced at the RSA Conference. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe