The process, the Wall Street aspect, was pretty fascinating. We're public now and it's great. You get taken more seriously as a company. You're no longer
Requires Free Membership to View
We have a bigger war chest now and stock that's worth something, which we could use in a future M&A (mergers and acquisitions) transaction. I have to be pretty circumspect in talking about some of what we have planned. We're looking at certain M&A transactions in spaces that compliment what we're doing now. We're looking for ways to leverage open source more effectively. We have some tricks up our sleeve, but it's too soon to really talk about them. The theme at Gartner this year is Security 3.0, the concept of having security baked into the larger IT infrastructure. Where does Sourcefire fit in?
We have what we call our 3-D strategy, which fits in really well with the Security 3.0 concept. It's an overlay security infrastructure that lets us take our technology, our IPS, defense center, and integrate it with the rest of the existing network infrastructure, making it more effective for providing security in our customer environments. I think it's a great dovetailing of technologies together. Everyone isn't going to run out and buy new security-enabled infrastructure -- switches, routers and so on. They want [their security] to work with what they've got, so our approach is intelligence-enabled technology that overlays very nicely on existing infrastructure. Snort is hugely popular and sometimes the open source community will cringe at the thought of more integration because they like the freedom to be flexible with different programs. How are the Snort users reacting to Sourcefire's direction?
They are very happy with our direction. The bulk of them are Snort users. I'm working on the new Snort 3.0 architecture and I've been showing it to customers and they love it. They feel it's the logical progression, a more comprehensive code base to attack their problems compared to what has come before. The existing Snort architecture has been in the field since 1999 and it is battle tested, very solid code. We're taking it in the next logical direction. The gear heads like the direction and those who aren't gear heads like that they don't have to be gear heads to use it.
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation