To: chaz who wrote (15205 ) 1/15/2000 2:12:00 PM From: Eric L Read Replies (3) | Respond to of 54805
Project Hunt: RSA Security Inc. (RSAS) - Post (1) Subject: VOLUNTEER REQUESTED! ... to kick start me I have volunteered to present RSA Security Inc. (RSAS) as a potential gorilla candidate within the Network Security Sector and more specifically within the Public Key Infrastructure (PKI) segment of the broader sector which also includes Virtual Private Networks (VPN) which I do not intend to focus on except peripherally. I am in turn seeking a volunteer who has a copy of the FM to assist me in one preliminary portion of my research. The reason for this is that although I have the RFM, I only have the FM on audio cassettes which are abridged and do not have the references I am looking for. My remembrance of the FM is that Geoff introduced his then client, Security Dynamics (SDTI), which owned RSA Laboratories, and is now known as RSA Security Inc., as a potential gorilla and also introduced a basket of other candidates for the sector including Check Point (CHKP), Cylink (CYLK), and Network Associates (NETA) that is variously known as Information Technology/Information Security (IT/IS), or just Information Security (IS), or Data Security, or Network Security. My further remembrance is that he treated the subject in 2 or 3 pages. Note: All references to the companies and the sector are dropped from the RFM. Art Coviello either fired Chasm Group or Geoff realized that at the time he wrote the FM that PKI was deep in the chasm and there were one heck of a lot of standards that have to come together If someone would care to volunteer to assist me, I would like to know: 1. What did Geoff call he sector? 2. Did he point to SDTI as the emerging gorilla? why? 3. Did he discuss PKI, digital certificates (or signatures), RSA encryption, Certificate Authorities (CA)? 4. Did he discuss Verisign VRSN at all and if so did he treat digital signatures separately from Network security? 5. Did he mention tokens, smart cards, two factor authentication, keys, certs, SecurID (the old SDTI token with the time based algorithm), ACE Server and the large SDTI installed base amongst Fortune 500 companies? 6. Did he discuss SDTI's value chain? 7. Did he position SDTI, IS, PKI, in the technology adoption cycle? 8. Did I dream all this? Thanks all that would care to assist or comment. I am now off to UD Library to see if they have the FM. BTW: For anyone that is interested in the sector here is a good audio link that introduces some vocabulary but ignores RSAS and discusses their competition (VRSN) (ENTU) (RNBO) (ISSX) (CHKP):vcall.com - Eric -