More organizations than ever are conducting business online. An expanding digital footprint and increasingly sophisticated cyber attacks have created a growing urgency to secure that data and the resources organizations are deploying.
K
Ken Xie
Profession:
Businessman
Born:
August 28, 1963
Nationality:
American
Quotes by Ken Xie
Showing 24 of 24 quotes
The cloud presents a variety of new opportunities for Fortinet, ranging from how we leverage our own cloud-based technologies to make networks more secure, to actually developing the solutions that help secure the cloud infrastructure.
—
Ken Xie
Our view is that if the network is involved, then we are there to protect it. Based on that, future developments will revolve around ensuring data, networks and applications are protected.
—
Ken Xie
As for the endpoint market, vendors such as McAfee and Symantec hold tremendous brand equity due to their consumer products. This of course translates to brand awareness in the enterprise, too.
—
Ken Xie
Cisco presents our biggest challenge in the firewall market for the fact that they have such a large percentage of market share. Displacement of an entrenched incumbent is always a challenge.
—
Ken Xie
Even beginning to teach cybersecurity awareness at an early age can pique the interest of future researchers, engineers, and administrators.
—
Ken Xie
Working with higher education institutions can also help to aid cybersecurity professionals who are already in the workforce. Programs like these can help to move the industry forward by building rigorous and universally accepted certifications and changing expectations of what a security expert can and should be.
—
Ken Xie
Although a number of network security programs are already emerging in colleges and universities, security is a field that benefits from hands-on experience in real-world situations.
—
Ken Xie
We talk a lot in Silicon Valley about product pipelines and sales pipelines, but what about talent pipelines? It is, after all, talent - people - who give us products to sell.
—
Ken Xie
Becoming an effective security professional requires more than knowing how to deploy and configure technology. It requires combining security theory with practical, hands-on experience.
—
Ken Xie
The reality is that there are simply not enough skilled humans available to properly plan, manage, integrate, and optimize security devices, strategies, and protocols.
—
Ken Xie
The threat landscape continues to expand, while cyber threats are continually becoming more sophisticated. This has convinced organizations to expand their security policies and deploy more security solutions.
—
Ken Xie
Cyber security is a dynamic space. The user faces different challenges every year because there are always new applications and data.
—
Ken Xie
You no longer can say that inside a company everything is trusted because you could bring in a contaminated device. And it's the same thing with data, because so much is no longer stored inside a company.
—
Ken Xie
If you knew the user, you'd let them in. But, the content could contain a lot of dangerous stuff, even if you know the person using that content, you have to check what's inside there. That's where Fortinet started, trying to go deep inside of content, or inside an application to make sure those were secure.
—
Ken Xie
With security, in the early days, we would just have firewalls and you'd check who could come into the network and who could not.
—
Ken Xie
We recognize that our employees are instrumental to our success, which is why we look for the best and the brightest in the industry. We consider ourselves not only a technology company, but also a learning company.
—
Ken Xie
From the beginning, we have fostered a culture that embraces our entrepreneurial spirit and values innovation that puts our customers first.
—
Ken Xie
When you start off with your first company, you are learning as part of the process and you make mistakes. The important thing is to recover quickly and learn from the experience.
—
Ken Xie
My parents, who were both professors at Tsinghua University, hoped that I would follow in their footsteps and become a professor.
—
Ken Xie
Ninety percent of cyber security companies begin in the detection stage. The issue is there are so many applications and alarming messages it is difficult for the user or the administrator to manage.
—
Ken Xie
All the new data, applications, and e-commerce that are created have to be managed and protected. Additionally, when there is a new application, the old application is still there, and has to be protected.
—
Ken Xie
Fortinet was founded in 2000 with the goal of making an impactful change in the network security space.
—
Ken Xie
Actually, we got paid because the name Fortinet is so close to Fortnite, so I'm fine with their name being close to ours.
—
Ken Xie