What's next?
As networks maintane, improve and defeat security issues, --once "in", then what?
As a long time "consultant", and having been asked to, e.g., run a Tape Backup from my Desk (as Global Domain Adminstrator), for convenience, again, --once "in", then what? (Mitigation of employee "stupidity", has to be opely addressed, --again, even "today".)
It seems to me this is not engaged, enough. Ironically, at that time, of this annecdote (a common theme not really talked about), --I was paid to "break" things from the inside out, --but as "consultant", which may be especially bad, though irrelevent, W2, Staff, does not matter.
No one, once logged in with their admin authored, log-in "Script", needs to do a directory search, or map a drive, or do a file copy (generally speaking here), not even an "admin", regardless of Permissions.
-- Since this assumes permissions are properly set, nonetheless, as a "virus" software monitors a exe, what monitors properly permissioned activity?
To me, this is not a complicated algorithm, so to speak, yet do not see it engaged. I do know, i.e/e.g., companies (a financial comes to mind), have a Division of Staff monitoring Email in/out, doing random checks, etc. that go beyond the incorrect items that get filtered via Text Parsing looking for what should have been ".nnn", not other, as place holders.
Will F5 ever engage active user monitoring? Again, not software, Users regardless of appropriate permissions, etc. If this is part of anything already, what product? Success data?
Rather than post a second questin: If F5, gets 20% of it's income from, i.e., Japan-market, will F5 consider buying/taking over ATEN, considering their position, in the present context, and their new valuation in this market context?