So we need those two groups to come together and share information. It's going on unofficially already. We'll go to Wall Street and talk about what we do and when they know our background the door will shut and they'll tell us they're sharing information with certain agencies. So there's some of that going on. But a framework for formalizing that, I think, would be really important. I think this bill was an attempt to move that agenda forward, and now we probably won't hear about it again until the other side of the election, which isn't good.
Going back to your statement that, if you're a likely target, you should operate under the presumption that you're already compromised, is that in fact what you find when you're first brought in?
Every one of our customers wants to do a proof-of-concept, and more often than not they have an "Oh my God" moment. But that isn't always a nation state stealing something. It might be information leaving the network inadvertently that's not causing a problem. But sometimes you'll find a smoking gun. I'll give you a real live example. We have an eval going right now with a biotech company and during the eval we saw the Chinese had compromised the network and were moving laterally across servers. But it doesn't always happen that way. Having said that, I do believe that the majority of Fortune 1000 commercial enterprises, if they're not already compromised now, they're going to be soon.
OK. Any closing thoughts?
Only that, having spent 10 years solving the problem in the federal government, I think we're in a unique position to really help commercial customers. We not only have the tool, but we have the smarts and know-how.
Read more about wide area network in Network World's Wide Area Network section.