At 04:30 PM 8/23/00 +0200, Mikael Olsson wrote:

>"Crumrine, Gary L" wrote:
> >
> > Those companies that are positioned to take advantage of the
> > opportunities, and have the staff and capital to do it "Right" will
> > reap the benefits in the long run.
>
>Translation:
>
>The company that has the most exceptional marketing staff and
>biggest marketing budget will convince all small and medium sized
>companies (95% market share) that their service is the most
>user-friendly and easily understood one, and therefore is the best
>one to use, regardless of all that technical gibberage that noone
>understands anyhow, will reap the benefits in the long run.
>After all, since they're the biggest ones, they have to be the
>best, right?
>
>...
!. Mikael is absolutely correct, it boils down to marketing.  But right 
now, the market space that Online Security Services are in is not well 
defined.  Firewalls, IDS, Attack & Penetration, etc. So the market needs to 
be defined.
CIO's read the paper and want to protect their organization from the evil 
hacker, but that is one small little problem that they might have.  An 
organization should be worried about FailOver, Capacity, Performance and 
Security.  Online Security Services are attempting to address them all but 
they can't.  If an Online Security services addresses security, what 
happens when you implement security patches and it breaks a web server that 
is the life line of that organization's business.  There goes all the 
organization's business in a heartbeat.



>Hmmmm... I see before me little animated paperclips that install
>as ActiveX(tm) components over the internet, come bundled with
>Internet Explorer(tm) 6, and connect to web pages via ActiveChannel(tm)
>to get the latest advisories, all typed up as user-friendly,
>easily understood snippets.
>
>How's this for an advisory of an exploitable buffer overrun?
>
>"We have discovered another evil attack using specially crafted
>intentionally malformed requests that are exceptionally difficult, next
>to impossible in fact, to construct, that could, in the extreme cause,
>cause arbitrary code to be executed with the rights of a user. This
>could not occur incidentally. There are lots of technical details that
>you don't want to be bothered with, so won't mention those here.
>Just download this patch (umh, sorry, "hotfix(tm)") and install
>everywhere and you'll be fine".
>
>:)
>
>/Mike
>
>Disclaimer: This was a purely fictional posting. Any similarity to
>any existing company or service is purely incidental.   ;)
>
>--
>Mikael Olsson, EnterNet Sweden AB, Box 393, S-891 28 �RNSK�LDSVIK
>Phone: +46 (0)660 29 92 00         Direct: +46 (0)660 29 92 05
>Mobile: +46 (0)70 66 77 636        Fax: +46 (0)660 122 50
>WWW: http://www.enternet.se/       E-mail: [EMAIL PROTECTED]
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to