After Web 2.0 comes Security 2.0
This is said not to be just a matter of a specific killer application. The new organisation is instead much more interested in supporting corporations with the automation of the logging and documentation processes required for adherence to legal guidelines for IT security. In most cases this has been handled manually, a time-intensive process. Several binding IT security guidelines for corporations are already in effect in the USA, including Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA).
Accenture and Symantec also intend to bring to bear their combined know-how for the monitoring of applications and systems. The protection of business-critical applications is also a top selling point for the two firms. Products like Symantec's Database Security and Mail Security 8300 appliances are intended to help protect the corporate infrastructure.
Yet "Security 2.0" is also Symantec's attempt to achieve something even greater: a restoration of trust in the net. Solutions like Norton Confidential are intended to help with this. It checks web sites for authenticity and scans computers for keyloggers before allowing transactions to be conducted, thereby preventing identity theft. The bottom line is that "Security 2.0" aims at changing corporate behaviour in matters related to security. The Symantec-Accenture union will use new solutions to simplify what many companies see as a complicated matter. There is likely to be heavy demand from mid-sized companies – since IT departments in those environments are often already fully occupied with providing user support.