Slide 40 of 58
Notes:
These technologies represent the primary players we have evaluated over the last 18 months. In some cases we have implemented a particular architecture to address immediate concerns even though it does not represent our long term strategy. What we have found is that there isn’t an integrated solution that will address are goals and thus we will marry a set of these technologies in our security infrastructure design.
Http://www.usenix.org/events/sec98/sites.html