 We're back live at VMworld 2012. We have a special spotlight segment called Non-Security, a panel, and I'm going to ask my panelists to go down and just quickly introduce themselves and tell us what they do. That's cheating, because you can't say him is last name. Ha ha ha ha ha ha. Go ahead. All right, so this is, well, perfect. I'm Hemma Preflachandra. I'm CTO and SVP of Products at High Trust. Chris Hoff, Chief Security Architect at Juniper, General Rebel Rouser. A virtualization security evangelist, architect. And your podcast? Can they put the podcast? Oh, and my podcast, yes. I run the virtualization security podcast, of which I was an inaugural member. First question is, what's the current state of security in the VMware ecosystem, and what does VMware have to do beyond the VMware walls as they're extending out their vision to make security work? In the new experiences of abstract pool and automate. Edward, we'll start with you. The biggest problem I see in the virtual environment right now with security is still a lack of education. The security folks are learning, but they're still not learning fast enough. The virtualization folks don't know enough about security, but they're the ones implementing it in a lot of cases. I still see that gap being there. The technology exists to secure the environment. It's implementing it and learning about how to implement it properly. So, in my case, I think that the three layers that they're introducing in terms of the product families, at the infrastructure or the core, the platform layer, they need to be a lot more open and transparent, allow more interfaces for vendors to plug in because most of the customers already have chosen their security vendors. They're not going to necessarily look to VMware to spill that gap on the higher tiers. I think they've already taken the open stance, but they need to apply that across all layers. I agree with you, Edward. I think the underlying technology is available in pieces, right? And the problem is that to use an old turbine, I hate this term, but it takes a village, right? The reality is that if you look at enterprise and service providers, they have existing partnerships, operational practices. They have favorite and non-favorite approaches to how they do things from a security perspective. And in many cases, we can't always do Greenfield stand-ups of data centers. And the notion that you can just pick up and move what you have, but make it all better is very difficult, especially given the legacy applications as well as legacy application architectures we've talked about. So, a lot of it is, in many cases, if you're a platform provider, you need to do more than put the word ecosystem on a slide deck to convince the world that you have one. And when you do it, you need consistency across a well-planned timeline for things like your APIs. Because when you're talking about startups or even large companies, when you build solutions on a set of APIs, for example, that change or aren't consistent or aren't equal, it becomes a real problem. So, we had Simon Crosby on who's got a new startup called Bromium, which we'll debate in a second. So, give you time to think of some good comments on that. But the one point he made was, enterprises are under siege by attack. So, what with mobile devices, multiple touch points, where's it broken right now? And where is it a complete re-architecture we were talking earlier with Chris on this, but I'd like to get all your comments on that. What does a company do to manage that threat, the security threat?