Analyzes the needs of enterprises wrestling with serious security architecture issues. Covers buying trends, deployment drivers, technology and spending plans, and opinions of vendors, including key vendor selection criteria.