News & Events

irg in the News

Our analysts maintain close working relationships with the press and are trusted sources of infor­mation about Internet infra­structure products. 

Recent Quotes in the Press Below  

  • “Effective spam tools protect email resources, but these engines still require scaling to deal with growing spam volumes,”  Peter Christy.  Cisco Touts Its Green Bona-Fides, CertCities, (May 27, 2008)
  • “Spam volumes continue to double annually and now completely dominate legitimate mail volumes. Without spam-mitigation tools, enter­prises would need to double email capacity annually, a practically unbearable burden.”  Peter Christy.  IronPort Reduces Power Consumption and Improves Efficiency With High-Performance Security Solutions, CNN Money, (May 21, 2008)
  • “When the core protocols of the Internet were created more than 30 years ago no one could have reasonably imagined the role they would play in today’s world, and they certainly weren’t designed to meet modern requirements”  Peter Christy.  Akamai Introduces Advanced Commu­ni­cations Protocol for Accel­erating Dynamic Appli­cations, Source Wire, (December 10, 2007)
  • “It is a brutal battle against intel­ligent and well-armed enemies.  This is a time where antispam companies will start to fall by the wayside.  If you’re not in the top four, there is a question of how you survive with a decent business if somebody doesn’t buy you.”  Peter Christy.  A shifting landscape for e-mail security, ZDNet News, (Jan 8, 2007)
  • “In the past, attacks were dominated by worms and viruses designed to create a big and very visible disruption. Increasingly, modern attacks have criminal intent, and the attackers are becoming more proficient at obscuring the attacks and delivering them from otherwise reputable regions and website categories in order to circumvent many of the defenses that have been effective against earlier attacks. These trends are a clear call-to-action for better detection and prevention methods.” Peter Christy.  Online Ads Deliver Most Hacks, PC World, (March 26, 2007)
  • “Many security companies not only are bowing to customer demands but reacting to Microsoft’s Windows Live OneCare, a security-software package introduced in May.”  Peter Christy. Companies promote affordable all-in-one computer security packages, USA Today, (December 26, 2006)
  • The trans­for­mation will not require a significant change to Ciscos hardware for switches and routers, but it will give Cisco greater flexi­bility in the form factors that advanced services such as security and appli­cation accel­eration run on.”  Peter Christy.  Cisco: Not a Network Box Seller Anymore?, eWeek (December 13, 2006)
  • “The email security space is clearly entering a consol­i­dation phase. IronPort is one of only a few vendors with the momentum to be a consol­idator. This move gives them control of the e-mail encryption technology. I suspect we will see more of this type activity in the near future.”  Peter Christy.  IronPort to Acquire E-mail Encryption Provider, PostX, SDA Asia Magazine, (November 3, 2006)
  • “Your e-mail processing costs are now being dictated by spam, not the volume of useful e-mail to the business.”  Peter Christy.  IronPort To Acquire E-Mail Encryption And Recall Software Provider, Infor­mation Week, (November 2, 2006)
  • “Global enter­prises like large financial services firms may have thousands of customer-facing appli­cations that are vulnerable to network-borne attacks. Many of these appli­cations were built in part long before these threats were understood.”  Peter Christy.  Cenzic Unveils the First and Only Web Appli­cation Discovery and Security Assessment Solution for the Enterprise, Market Wire, (October 30, 2006)
  • “A holistic approach is needed to help small, and big, customers alike secure their content. Such a security system should be integrated, entirely, into the networks of corpo­rations, so it will provide compre­hensive security, and not just examine outbound e-mail messages” Peter Christy.  Survey: Organi­zations Not Doing Enough to Secure Data, Tech News World, (July 24, 2006)
  • Regulatory compliance makes being a small public company difficult.  It makes it less attractive to go public.”   Peter Christy.  Security Software IPOs: Where’d They Go? The Street, (July 13, 2006)
  • “Botnets — those collections of compromised PCs running under a common command-and-control infra­structure employed by cyber­criminals to send out spam or for denial of service (DoS) attacks — are now so prevalent that 90+ percent of the volume of spam messages originates from bot-infected machines. Sixty percent of home users on broadband networks are probably infected and in some degree controllable for the forces of evil.”  Peter Christy.  Spam-spyware combo will spawn targeted attack tools, Appli­cation Devel­opment Trends Magazine, (June 5, 2006)
  • Another reason to encrypt data at rest is the ubiquity of small, inexpensive hard drives, Peter Christy said. “A 60G iPod can hold everything of value for a large company,”  he said. Encryption technology has become more robust, trans­parent and easier to use.  Peter Christy.  Mobile computing and larger databases pose new risks for unpro­tected data, Federal Computer Week, (March 13, 2006)
  • Peter Christy said the market is growing because companies want to establish controls as to who can enter corporate networks. “It is a funda­mental problem,” Christy said. “What you want to do inside an enterprise network is be able to evaluate lots of the conditions about someone trying to use the network — do you know who they are, are they using an unknown system, is it fully up on virus protection?”  Peter Christy.  In the Money Lockdown Networks,  Seattle Post-Intelligencer, (February 27, 2006)
  • “Companies like F5 [Networks Inc.] only in the last two years became even measurable by the size of what Citrix is doing. With people like F5 and Cisco [Systems Inc.] jumping in with both feet, the battle should be inter­esting.”  Peter Christy.  Citrix Widens Its Scope, My Wire (October 17, 2005)
  • “People have been concerned with the bottom line – ROI (return on investment), cost saving, central­ization of functions. The big shift in the last six months is toward top-line improvement.” John Katsaros, Red Herring, (June 27, 2005)
  • “Before a company can secure its network, it first needs to know what’s on it.” Peter Christy, Yahoo Financial News, (June 13, 2005)
  • “Spyware has evolved to present a very disquieting threat to enter­prises.” Peter Christy, Yahoo Financial News, (June 7, 2005)
  • “The overhead of being a public company has changed pretty dramat­ically… It’s no longer quite as attractive as it had been, and this makes being acquired by a larger company a more attractive propo­sition.” Peter Christy, Monsters & Critics Tech, (June 5, 2005)
  • “While threats may still be real, the market for e-mail security also has turned from a seller’s market to more of a buyer’s market as the first wave of customers has already installed technology such as anti-spam software.” Peter Christy, Monsters & Critics Tech, (June 4, 2005)
  • “Bill Gates… said that Microsoft was going to spend roughly $2 billion a year in R&D directly related to security, the largest single R&D investment in the infor­mation technology security industry. Where will this money be spent and what is the impact on vendors, enter­prises and consumers?” Peter Christy, Tekrati, (June 2, 2005)
  • “Even great mathe­maticians are having diffi­culties getting their voices heard or convincing others to wrap business models around their innovations.” Peter Christy, Labrador, (May 2005)
  • “A good Web accel­erator can mitigate packet loss, or latency, as infor­mation is sent from router to router.” Peter Christy, CNET News, (May 9, 2005)
  • “The purchase of rival Speedera by Akamai] is the Hatfields and McCoys getting married.” Peter Christy, Mercury News, (March 17, 2005)
  • “As the Internet increases in importance, the value of web accel­eration grows.” Peter Christy, Computer Weekly, (October 26, 2004)
  • NetsEdge Research Group founder Peter Christy chaired a panel called “The Untrust­worthy Nature of E-mail”  Inter­netWeek,  (June 18, 2004)
  • “Could it work?  Absolutely!”  Peter Christy, USA Today,  (May 4, 2004)
  • “The simple fact that [Google] can build and operate data centers of that size is astounding.” Peter Christy, The Unrea­sonable Man, (April 29, 2004)
  • “People spend more time on e-mail than they do on word processors. It touches every part of the network, so you want to care about it.” John Katsaros, Red Herring, (April 26, 2004)
  • “Netilla is one of the very few SSL VPN vendors whose strategic vision encom­passes the true breadth of the emerging secure appli­cation access market needs.” Peter Christy, Netilla Press Releases, (February 23, 2004)
  • “Commodi­ti­zation down in the network means the move to standard­ization and simpli­fi­cation is going to continue.  I think people are seeing that arbitrary differ­en­tiation at the lower levels is irrelevant,” Peter Christy, CIO Insight.  (September 1, 2003)
  • “IPv6 is the only way to attempt to define a protocol clearly enough so that, if independent organi­zations implement it, they will all work together,” Peter Christy, Networking News,  (March 24, 2003)
  • “The bigger players abandoned the business and the smaller players are building substantial businesses.” Peter Christy, InternetNews.com,  (April 25, 2003)
  • “Suddenly the customer discovers what’s going on on the line, like bulk e-mail that hurts voice over IP or old Apple Talk that clutter’s the line with no produc­tivity,” Peter Christy, Network World Fusion,  (Dec. 8, 2003)
  • “As companies move more business-critical appli­cations and services to the Internet, the performance of those appli­cations mounts in importance.”  Peter Christy, Warp Solutions Press Release,  (December 4, 2002) 
  • “HiPerEx­change makes using Exchange remotely feel like running Excel or Word.” Peter Christy, Seaside Software Press Release,  (November 19, 2002)
  • “This is your father’s performance after all.”  Peter Christy, Business Commu­ni­cations Review, (November, 2002)
  • “Array Networks has estab­lished itself as a leading innovator of Web traffic management products the support the real needs of enterprise appli­cations that leverage Internet connec­tivity.”  Peter Christy, Array Networks Press Release, (October 21, 2002)
  • “CDNs, having pieces of the appli­cation that run near to the users, will play an important role in Web services.”  Peter Christy, Network World, (September 30, 2002)
  • “Successful deployment of a mobile infra­structure enables a company to complete the build-out of valuable employee– and partner-facing appli­cations, effec­tively including those users who are usually away from network connected offices.” Peter Christy, HP Press Release/CommWeek,  (September 25, 2002)   
  • “The Internet itself — the routers and commu­ni­cation lines — aren’t going to get better in a way that fixes performance any time soon.  Clever system technology will be where the performance improvements come from, primarily.” Peter Christy, Network World, (September 9, 2002) 
  • “They’re in an inter­esting position, a little like Alice in Wonderland.”  Peter Christy, The San Jose Mercury News, (June 2, 2002)
  • “The web is clearly becoming a critical part of enterprise IT, not just the means of providing public access to marketing infor­mation.” NetScaler Press Release, (May 7, 2002) 
  • “In addition to reducing hardware costs, spreading processing chores among a series of servers can improve the scala­bility, relia­bility and fault tolerance of an IT infra­structure.”  Peter Christy, eWeek,  (April 1, 2002)
  • “The market for these products could be as big as $2 billion by 2005.” Peter Christy, Wall Street Journal
  • “A lot of energy is being devoted to finding alter­natives to streaming, which is the single most intensive source of network demand.”  SparkPR (March 26, 2002)
  • “Security is the funda­mental challenge to making it all work.” Peter Christy, Vordel, (March 19, 2002)
  • “One of the problems when you provide these Web services is how do I scale it and where does it need to run to be useful to the people who need to consume it.”  Peter Christy, InfoWorld, (March 18, 2002)
  • “The Sockeye Networks GlobalRoute service is a first of its kind for IP routing.” John Katsaros, ISP-Planet, (December 12, 2001)
  • “It’s worth noting that this kind of slowdown has histor­ically been a great time for looking forward, and a great time for grabbing market share when things defrost.”  Peter Christy, Wired, (December 5, 2001) 
  • “People trust Dell. They are more comfortable knowing a machine was built by Dell rather than some random assembler that could be going out of business.”  Peter Christy, Silicon Valley Biz Ink, (November 30, 2001)
  • “E-mail is an important appli­cation.  At some point, you are going to get into the sights of the big boys.”  Peter Christy, Wall Street Journal, (November 27, 2001)  
  • “Critical parts of e-mail are still done with free software that has evolved over 20 years and it’s hard to imagine how much the world has changed in those 20 years. IronPort has carefully reengi­neered an e-mail gateway for today’s technology and Internet.” Peter Christy, CNET, (November 27, 2001)
  • “Oracle9i Database clearly is an inflection point in the evolution of clustered database systems,” Peter Christy, Oracle Press Release,  (June 14, 2001)
  •  “To achieve dependable connec­tivity to the Internet typically requires parallel links from multiple network providers—called ”multi-homing.  “Yet, with this comes the complexities of multi-homing which require on-going vigilance and activity to maintain stable, high-performance, cost-effective connec­tivity across the Internet,” Peter Christy, Sockeye Networks Press Release,  (June 25, 2001)
  • “An exciting example of how service providers and their customers can share critical performance, maintenance, monitoring and reporting data, providing an invaluable tool for making service relationships really work for both parties,” Peter Christy, Totality Press Release,  (May 29, 2001)
  • “Chain­casting may indeed be a breakaway technology for Internet broad­casters trying to overcome high bandwidth costs associated with streaming live content.” John Katsaros, ChainCast Networks, (April 23, 2001)

^ Back to top