- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
Page 6 of 7
Cameron has galvanized the industry into a discussion of digital identity with his "Seven Laws of Identity." In addition, he has wired together a virtual who's who as part of an everyone-invited effort to define the science of identity and its application to computing. The list includes his boss Bill Gates, open source leaders, Microsoft-bashers and academics (see in-depth profile).
In the year since taking over for her brother-in-law as CEO, Chen has moved decisively into emerging markets. Chen took on mobile phones with security software for Symbian operating system smart phones (such as Nokia). She attacked spyware in the enterprise with new products and pushed into anti-spam reputation services, making the latter move through the acquisition of Kelkea. She also partnered with wireless-router maker Netgear to beef up Trend Micro's presence in consumer markets. She did lose some face (and about $18 million) when Trend Micro released a buggy anti-virus update, but the company rebounded quickly from the costly gaff (see related story ).
Samenuk has realized he doesn't have to expend energy in head-to-head combat with competitors such as Symantec. With a little creative thinking and strong products, he is reaching enterprise and consumer customers in new ways - and having financial success at it. For example, the relationship he struck with AOL to sell McAfee anti-virus and e-mail security wares has become a model for other service providers and is leading to unusual enterprise-customer wins, Samenuk says. He points to an agreement with Canada's ScotiaBank in which the bank will sell McAfee services to its online banking customers. He's also pushing McAfee with other clients, for instance, partnering with USB maker M-Systems to bring anti-virus technology to memory devices.
In 2005, a maturing Shwed has steered his venerable firewall company in directions that bode well for both himself and the company. Among his top '05 moves was the purchase of open source intrusion-detection system Sourcefire. Although Shwed is vague about how he plans on integrating Sourcefire with Check Point products, most analysts say the technologies dovetail nicely. Shwed promises to keep open Snort, the popular Sourcefire tool. He's moving into the desktop too, acquiring Zone Labs for its endpoint security technology. And Shwed has countered encroaching hardware vendors by rolling out appliances broadened to include protection of Web and LAN traffic.
As one of the users who founded an industry consortium, Simmonds' influence is powerful indeed. His untiring energy has opened communication channels among international users to create next-generation security infrastructures in a no-perimeter world. Simmonds has attracted a who's who of global enterprises onto his governing board, including BP and Procter & Gamble. Its member roster of more than 50 end users is no less impressive. In 2005 Jericho completed a vision statement and began the technical, committee work to turn vision into standards. Simmonds also has been busy reaching out beyond the global biggies. At a Black Hat security conference, for instance, he organized a contest for papers that further the no-perimeters concept.
Thompson packs a punch with his pitch that Symantec and other security companies have to expand into areas such as storage and systems management to remain relevant. Some industry watchers may doubt his strategy, but he has certainly drawn attention with his plans to move Symantec beyond security and into data-storage management, via the Veritas acquisition. Non-security vendors - think Microsoft in particular - trying to move into Symantec's home court won't have an easy time against the man and his vision.
> Next Power 50 section: Service Providers