Feature

Perspectives: Symantec, Veritas pairing to change security

Ezine

This article can also be found in the Premium Editorial Download "Information Security magazine: 12 security lessons for CISOs they don't teach you in security school."

Download it now to read this article plus other related content.

Symantec's merger with Veritas will change security managers' lives.

Technology purchasing managers and investors have skewered the merger of security giant Symantec and storage stalwart Veritas because of the apparent disconnect: These two companies--their products, channels and customers--couldn't be farther apart. But, Symantec and Veritas do share a vision: a new technology landscape and marketplace that will quickly evolve and affect everyone in the security and storage communities.

The bold merger will dramatically shift the way enterprise customers look at infrastructure software. Symantec foresees a security market that is subsumed by infrastructure and network management; security will become a FEATURE, not a core offering. The merger will give the company an early lead in this emerging space by combining data management and integrity capabilities. It's the evolutionary equivalent of fish leaving the sea and learning to walk.

The biggest obstacle facing Symantec and those that follow its lead is convincing customers that this vision is correct. Here's what the company foresees:

  • CSO/CISOs no longer implement technology. With Sarbanes-Oxley and other industry and government mandates, the security executive will transition to a risk and compliance manager, becoming less involved with operations of security technologies. CSOs will resemble consultants and auditors, helping infrastructure and business managers maintain data security

    Requires Free Membership to View

  • and ensuring corporate compliance.
  • Price trumps best-of-breed. Security managers have traditionally looked to best-of-breed, pure-play security vendors for products and services that create a synergistic, defense-in-depth infrastructure. That philosophy is shifting as enterprises look for cheaper, easier-to-manage, better-integrated products offered by large, one-stop shops such as Cisco Systems, Symantec and McAfee. Lowering total cost of ownership will trump the perceived gains of point solutions that require extensive integration.
  • Commoditization drives budgets to infrastructure. Security and IT budgets aren't unlimited. Despite the continued threats to infrastructures and data, the C-suite is still holding back the reins on security spending. These constraints will only get tighter as security products commoditize and their technologies consolidate with applications and infrastructure devices. In short, security managers won't get funding for everything, and dollars will flow toward infrastructure spending that includes network functionality, management capabilities and security features.
Security practitioners can look forward to a world in which security is a FEATURE of infrastructure software, closely tied to applications, networking and hardware. The new category of infrastructure software comprises four distinct categories: security, systems management, network management and storage. This shift will drive the vendors to merge and create powerhouses, mimicking the Symantec/Veritas merger and putting a tremendous squeeze on pure-play vendors.

The road will be bumpy for vendors and security buyers alike. We're experiencing a wholesale shift in the technology landscape, which will eventually benefit enterprises with better integrated, less expensive secure infrastructure products.

This was first published in February 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: