throbber
Declaration of Phil Hartstein - Reexam 90/013,016
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`: Confirmation No.:
`
`9521
`
`Group Art Unit:
`
`3992
`
`Examiner:
`
`Adam L. Basehoar
`
`Attorney Docket No.: FINREXM0005
`
`::
`
`;:
`
`::
`
`Control Number: 90/013,016
`
`Patent No.:
`
`7,647,633
`
`Inventors:
`
`Ederyet al.
`
`Issued:
`
`June 12, 2010
`
`Title:
`
`MALICIOUS MOBILE
`CODE RUNTIME
`MONITORING SYSTEM
`AND METIIODS
`
`
`Mail Stop Ex Parte Reexam
`Attn: Central Reexamination Unit
`Commissioner for Patents
`United States Patent & Trademark Office
`P.O. Box 1450
`Alexandria, VA 22313-1450
`

`DECLARATION OF PHIL HARSTEIN PURSUANTTO 37 C.F.R.
`
`DearSir:
`
`I, Phil Hartstein, make the following declaration under penalty of perjury:
`1.
`I make this Declaration based upon my ownpersonal knowledge, information, and belief,
`and I would and could competently testify to the matters set forth herein if called upon to do
`
`SO.
`
`2.
`
`Iam the current President of Finjan Holdings,Inc. (“Finjan”).
`
`I have been President of
`
`Finjan since April 2013.
`3. As part of my position as Finjan’s PresidentI oversee the direction and managementof
`Finjan’s assets, future investments,litigation, and licensing activity. This has required meto
`study Finjan’s history and to become acquainted withFinjan’s technology.
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 1
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 1
`
`

`

`Declaration of Phil Hartstein - Reexam 90/013,016
`
`. Finjan has invested considerable time, effort and resourcesto secureit’s invention with US
`
`an Foreign patents, Finjan has invested over 65 million dollars in research and development
`
`of its technology.
`
`_ The total revenue to date for Finajan’s licensing and enforcementactivities ofits patent
`
`portfolio, including the ‘633 patent, is more than $145 million.
`
`Finjan has consistently been praised forits pioneering technology. For example, IDC
`
`reported that:
`
`the inventor of proactive content behavior inspection, protects
`Finjan Software,
`organizations using its Next Generation of Vital Security Appliance Series of products
`that provide day-zero defense against new, previously unknown attacks byleveraging
`its proprietary application-level behaviorblocking technology.
`
`(Exhibit 1 at 55-56)
`. Finjas wasthefinalist in two of SC Magazine’s 2007 Awards, Best Security Company and
`Best Security Solution for Government — Finjan Vital Security Web Appliance. (Exhibit 3).
`Finjan was the winner of the Winner of Excellence in Anti-Malware and Winner of
`Excellence in Gatetways in the Info Security Products Guide — Product Excellence Awards
`2007. (Exhibit 4), SC Magainzerated the Finjan Vital Security NG-6100 5 out of'5 stars.
`(Exhibit 5). PC Pro stated that the Finjan Vital Security NG-1 100 appliance “is one ofthe
`best solutions available.” (Exhibit 6). Finjan Vial Security Web Appliance was the winner
`of eWEEK’s Seventh Annual Excellence Award in the Network Datastream Protection
`
`category. (Exhibit 7). Named in the top ten Most Interesting Products exhibited at RSA
`2009 by eWEEK. (Exhibit 8). CRN.com review praised Finjan’s Vital Security Web
`appliance because “Finjan’s Vital Security can make a difference in organizations concerned
`about security and compliance.” (Exhibit 9). SC Magaine gave the Finjan Vital Security
`NG-8000 5 out of 5 starts. (Exhibit 10), SC Magazinc commented that the Finjan Vital
`Security Web Appliance Series was“[jJust about the most comprehensive productof its kind
`
`[they have] tested.” (Exhibit 29).
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 2
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 2
`
`

`

`Declaration of Phil Hartstein - Reexam 90/013,016
`
`8. The ‘633 patent’s technologyitself received specitic industry praise.
`
`Anarticle by
`
`InformationWeek described the Finjan Vital Security 6100 appliance as taking “signature
`based protection to the next level by actually executing the code ofthe site you'revisiting in
`
`a sandbox in real time.” (Exhibit 2).
`
`In July 2005, Microsoft Corporation obtained a license to Finjan’s computer security patents.
`(Exhibit 12) (Exhibit 1 at 13). This included the application that was to becomethe ‘633
`Patent, Microsoft obtained a license to Finjan’s technology in orderto advance their security
`
`innovation just after entering the computer security market. At the time Microsoft obtained a
`license to Finjan’s patents Microsoft had nearly no market share in the computer security
`space and washeading to compete against large well established companies.
`(Exhibit 13).
`Microsoft saw the value of licensing Finjan’s technologyto help give them a boost and now
`
`Microsoft is one of the more dominant players with Microsoft Security Essentials product.
`
`(Exhibit 14). A Microsoft spokespersonstated that “Finjan has done someinteresting
`
`1
`
`Oo
`
`product innovation in the security space.” (Exhibit 12).
`OnJune6, 2005 Finjanfiled a complaint of infringement against Secure Computing Corp.
`(“Secure Computing”) asserting that Secure Computing infringed U.S. Patents No.
`6,092,194, No. 6,804,780, and No. 7,058,822. (Exhibit 15 at 2). This case proceeded to a
`jury trial where Secure Computing asserted that U.S. Patents No. 5,623,600 and No.
`5,983,348 by inventor Shuang Ji (“Ji”) were priorart to the Finjan Patents. (Exhibit 16 at 39).
`The jury disagreed and found all the Finjan patents not invalid by the asserted prior art.
`(Exhibit 17), Secure Computing was also foundto infringe Finjan’s patents, including their
`sandboxing technology, and awarded damages on Secure Computing revenue of $65.75
`
`1
`
`—
`
`million. (Exhibit 17).
`. On August 18, 2009 the district court in the Secure case enhanced Finjan’s jury verdict. The
`court bases its reasoning for enhancing damages partly on a finding that “Finjan’s patents
`were copied deliberately” and “Finjan patents represented a technology that [Secure] wished
`to compete with and emulate in the market.” (Exhibit 18 at 28). Secure Computing even
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 3
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 3
`
`

`

`Declaration of Phil Hartstein - Reexam 90/013,016
`
`namedthis copyingin their code andcalled it “Finjan Buster” or “Finjan Killer.” (Exhibit 19
`
`at 7). Finjan was also awarded a permancntinjunction against Secure Computing for
`
`infringing Finjan’s sandboxing technology. (Exhibit 18 at 1)
`
`12.
`
`In November2009, Finjan licensed its patents to M86 Security
`
`13.
`
`In March 2012, Finjan licensed its patents to Trustwave Security, Inc.
`
`14.
`
`15.
`
`In April 2012, Finjan licensed its patents to WebrootInc.
`In November 2012, McAfee, Inc./Intel Security (“Intel Security”) took a license to Tinjan’s
`
`patent portfolio. When Intel Security took the license to T'injan’s patents, the permanent
`injunction that had been levied against Secure Computing (whichintel Security purchased in
`2008) was dissolved. (see Exhibit 18 for the permanent injunction against Secure Computing
`
`which included Finjan’s sandboxing technology).
`. Finjan had millions of dollars in sales with products that incorporated the ‘633 technology.
`(Exhibit 20 at 20). Indeed, Finjan hadsales of $6.5 million in 2001, $6.1 million in 2002,
`$9.3 million in 2003, $12.9 million in 2004, $16.4 million in 2005, and $19.7 million in
`2006, (Exhibit 21 at 11) (Exhibit 22 at 9) (Exhibit 23 at 15). During this time Finjan had
`incorporated its patented sandboxing technology into its Vital Security product linc, (Exhibit
`
`24).
`_ In total, Finjan has licensed its network and computer security patents to Microsoft, M86
`Security, Trustwave, Intel Security and Webroot. Finjan had millions of dollars in sales of
`the ‘633 technology. Finjan’s competitor Secure Computing was found to have copied
`Finjan’s technology. Finjan’s enjoyed much industry praise for its sandboxing technology.
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 4
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 4
`
`

`

`Declaration of Phil Hartstein - Reexam 90/013,016
`
`i hereby declare thatallstatements made herets-olmyawnknowledge arc trae and thet all
`statuinents made ott Infornmtion andbelied are believedta betrue; anut furtherthal these
`
`aiglaments were made with the laieiwiedgethar willfil false starententsacdthelike so made are.
`
`punishableby fineor imprisonment, of both, under Seetion LON) of Tule 18 oftheUnitedStates
`Codd, arvt that such willful false statements may jeopardize lhe validity ofthe patent and any
`
`roexamingtion certian
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 5
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 5
`
`

`

`Exhibit 1 - Declaration of Hartstein - Reexam 90/013,016
`
`
`MARKET ANALYSIS
`
`
`winfelcece
`
`Worldwide Secure Caonlent Management 2009—2009
`Forecast Update and 2004 Vendor Shares: Spyware, Spam,
`and Malictaus Cote Cantinué te Wreak Havoc
`Brat &. Burke
`Rose Ryn
`
`
`IDC OPINION
`
`
`
`
`
`Thiet
`eye e revieian of JOG 834082 published in Gatober 2008. The: antl dite:
`
`secure nonlent management (SCM) market grew to 24 9 hillion.in 2004, up from $3.5
`
`Gilde the: preview’ vear, an. extacndinary DOW growit tony 2008 to-2004, Additional
`findings hased-on HDG's:tesearch ere sdmmarized teipve:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`any
`&oeaycal
`-a3
`aydo
`=]
`eat
`oH
`
`
`
`EE
`
`
`
`The tidtivatiog. af haters and the saphstioation af ihreale: have dramatically.
`
`the number 7 driving force banind the glopal-snem
`tangea. Fineneal gainis
`epnemic,
`the outtreak oof. "phishing ssanis. and the eyplosive growth cof
`Bayware.
`
`
`ths. priority list of comporeate asocrity concecm,
`‘move: up.
`to.
`Spyware: gantinues:
`
`Spyware iS Now -annsiderad to be the second-greatest: threatto enterprise stehargrk
`
`Secuflty, according te IDCs 206
`ise Security Survey: IDCchetieves more
`than. three-quanters-of all corporate machitias: afe infected with ve rous: forts of
`Spyware,
`
`
`Spam contin yee to cing netvorks, servers, end inboxes with: unwented-and adien
`alfensive -conterit.. The convenience and efficietioy Bf
`email Have heer
`“ieamatically teduced bythe extremely rapid giswih.in the volume ot inachoited:
`Sommercial-emeail. IDE believes the number-of spam tiessages Bent daily wil
`
`
`
`“glrigat double ave
`the next few veers. ipbregsi sg Aree 23 tiiliaa in 260dAS
`
`
`
`billig ine 2008 (gee. Wonnwite Ema Usage 2004-2008 Farscast! Spam Today,
`
`Other Content Tomarrow, MOC #84782;August 200d).
`
`imeluding:
`Ertail pipelines consnue. tebe atavotie targel formalicious: attacks,
`ApOIAS; Visesof
`
`
`shety. avid tended thraaisa, Moredver tedent incidents. have
`athlgved widespread! propagation at ites -significanilly faster thar befow. The
`ge of spamming tectinigues te cihstibute malicious: 6 nails and vituses bas also:
`
`
`ine Based the speed: with which these adacks can cause significant damage. AS
`
`a.fésult, prapagation timas for malicious eral vitises-have Grapped trem bouts
`to minules,
`
`There is. a growing demand for-seluti¢ns: that protec againstiefination leaks ger
`‘and vidlallong of governtient and: industry regulations. Thede sdkitions mane,
`secursfencrypt, (Her, snd: block souteelnd -content ‘cartdined ‘in emai,
`instant
`Taassagng (Mi, peer to peer [P2PL, filkiangers, Web. postings. aud-other {pes of
`Measacing trate.
`
`
`
`
`
`
`
`lien biManiction: Novara2005. (GG adane2. VolumeA aby Bendre ©
`
`CONFIDENTIAL.
`
`FINJAN-BC 047425
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 6
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 6
`
`

`

`Exhibit 1 - Declaration of Hartstein - Reexam 90/013,016
`
`
`
` _TABLEOF CONTENTS
`
`
`
`
`“Ate THis Stady
`Methoddlogyt... eee
`Secure Content Management Market Definition ..
`EMECURIVE: SUNITIATYs.cc:eccseetuivaensesdereseedseeoveeiiens
`te
`
` Wyoe
`
`od
`
`Situation Overview.
`
`Hot-frents in the Secure Content Management Market
`Spyware: Motivated by Fmancal Gain
`
`Spam: Threat on the Rise Again...
`
`Outbound Content Compliance: Infrmation Leakage and Da
`Enterprise RightsManagement Gaits Traction...
`
`MidrogoR Continues to Expdid lis Secuiiity Aigenal..
`WebFiltering. NeLonger Justa Productivity Tack,
`
`Performance of Leading Vetidors si2004 wo. ungsuskeccie.
`wet
`Vendor Performance by Market Seqmierit:
`wd
`PAOUIVIT US iseca Sere nape te ed encieg woe
`
`Messacing Security
`Web Fitteting
`we V ia
`AUISYWEG co) eek cee he oy Ape ea es one mages Mapas Apeeaen Sageve AyRD aca! lees Mean lag cats pelea
`
`Pigtection “OBAeete
` TrGOILad
`
`&%
`
`1 4
`
`Raters DUtdok!6Soo oeAa
`
`
`
`Forecast and: Assumptions .....
`WUCfc ccs teres
`By Plattarttic., ceca ui
`By GedgAaphic Rayidn
`.,,
`By Cperating Environment.
`Key Forecast Assumptions:
`
`
`
`
`
`
`
`.sential Guidanée
`Verdot Profiles ..cci..
`Symantec Corp...
`RCABE INGco...
`Trend Micra Wie.
`Cotmulet Associates
`34
`SurhOGards wecessseeee
`
`Websense.
`
`Boptios.....
`
`Cleatewitticcerics.
`Messagel-abs ..
`Tuirbleweed Communications:
`F-SBeutte cnccuiciacunnessiencsss
`Secure Computing, «..
`WeEWOSKEt occurs
`CipherTrust [tie seencaces eee
`‘Aladdin Boewledge Systems w.,...
`
`:
`
`
`
`.
`
`:
`
`saenedaneibnntvs
`
`dite
`
`#48083
`
`S2003 12RC
`
`CONFIDENTIAL
`
`FINJAN-BC 017426
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 7
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 7
`
`

`

`Exhibit 1 - Declaration of Hartstein - Reexam 90/013,016
`
`
`
`
`
`
`
`Finjan Sottware:..
`
`Bigs. Coat Syste:
`
`Berd meal cc. cs
`
`SIGABS. wos cect eee
`
`Strategic Directors... 0.
`St Berman Software...
`
`SABTICEDE coe eee ee
`
`Claudmark......
`
`
`Prooipoint..
`
`
`
`
`
`
`Internet Security Systems thafaebeugetee: . wiles Hpteebe lateg bende eweene peel
`
`
`BSi i seer ini ertadiaes
`69
`
`FageTimne Conimunicatons 3
`4
`
`HMOGIG cei cen
`
`
`Mail-Fliters Ine...
`
`
`MaiiFroontier. ...
`
`
`vaibeestis
`Mifapaintinc..
`
`Werwork Appliance. Inc...
`
`Bint rigSt wits. occ pec cecge ap eves
`lronPert: Systenis.
`
`Kespersky Lab...
`
`Microsoft Coie,
`
`Pandas Software:
`
`Tenebril ne..;
`
`Tablis int...
`
`SOMWACL Te. cccsness
`
`RRR MBER CD LEZE SURES NSLS SSUES a Steen remem eerie
`Roalated RESPAlGhaiin cisessaincce cedeetecca vided naababicneis iateneabdee Sapendicconieed nips beeeeridetiv Abbie emdiite Geupid aes ids riedgesming devia 2D
`MOTGdODE ccccscscise eterna eared ac pate ote agGb Lane bbeUh Ahh p Qed Wid cee bg! Hed dGSteLISge Zaid Whee sgtaiiee nant ta AE
`
`
`
`2005106
`
`#34023
`
`CONFIDENTIAL
`
`FINJAN-BS 017427
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 8
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 8
`
`

`

`Exhibit 1 - Declaration of Hartstein - Reexam 90/013,016
`
`
`hist or tapees
`:
`
`
`
`
`nD -
`.
`-
`.
`_ co
`
`4.
`NVoridwade Secuie Contant Management Product Revenue byVendor 200sand 200d... ec &
`
`AWorlehwide Antivirus Produat Reesnue by Vendor, 9003and 200d:
`2
`
`3. Worldwide Messaging Securiix Produtl Rewsnue by Venddr, 2003 and POU..
`4 Worldwide Web Fitering Product Reverieby Vendor, ZOOS Bd 2IG4se crenneetnsesgencetgsenereascns, TF
`5 Worldwide AntiSpyware Product Revenueby Veridar 2008 and S004. ces scene TE
`Lg
`AMforiiwite SecuContentManagement Product Revenue sySegment 2003-2008+. 2. cnc BE
`2
`‘Weorldvede Secure Conteh Management Prouu tt Revenueoy Plathort), 200832009.eZ
`® Woridwide Serure Content Managerment Product Revenueoy Region. 203-2006ewe BI
`
`
`Ravenue by Operating Envir
`9 Worldwide Setire Content Management Product
`PODSPOTcel cesses esas snnecnm ceans ions atepcaguess
`cnysnis
`qualenanetyscivenaieys pueeesanensoesten gst
`BE
`1G Key Forecast Assumptions forthe Worldwide Serre Canterd:Management
`Ket
`
`
`SOOORAED eee
`coins
`ae iga
`
` Co
`
`#aRORS:
`
`Se0b8 1S
`
`CONFIDENTIAL
`
`FINJAN-BO 047428
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 9
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 9
`
`

`

`Exhibit 1 - Declaration of Hartstein - Reexam 90/013,016
`
`
` eenn BR
`
`pvc cbitinastive dara ctecies T4
`= Top §3ecure Coiieht Management Software Vendors. BOOeecc sieoe
`3.
`“Top SecureContent Managenient Apphanite Vendats) 2008)asia ciithenmtsniaie entice TE
`4
`Top § Secure.Content Managenient Hosted Service Vencors,.2005..
`
`
`‘Top S Web Fiteing Software Vendors
`
`“Top'a WebFiltering ApplianceVendors...
`BSecuritysChallanges Organizataris hace overthe hoePEMGAHEsocere semenete
`
`5
`&
`
` e 3re 9° Day
`
`#40238
`
`CONFIDENTIAL
`
`FINJAN-BS 017429
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 10
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 10
`
`

`

`Exhibit 1 - Declaration of Hartstein - Reexam 90/013,016
`
`IN THIS STUDY
`
`‘Thid-study-is 4 sevision-of IOC! #24022. The vendor. market shate grid foresaata tae
`been fevised:in liGht-of ew informafian.
`‘This study exaniines: thé:.seaure cantest
`Management market for the period 2002-2000, wilh vander’ revenue trande and
`
`Markel -growlh Jorcasts. Wordwide market sizing Ig provided for 2004,
`from: 2003: Activesyear growth forecast forcinis market is: shawn for 2605
`
`
`vendor compatiive analysia: wih vender cayeriaesancd.matkat shares at whe lead iQ
`venders,
`13 provided for 2004. This study aise includes..praties of eading venders and:
`
`idefitifies thechamicrensiice that vahdots wil need to. be successtul ithe dLtate. THE
`
`decurmentuppates the forscact: puidlishedl in Workiwide Secure Content Management
`2003-2009 Forecast. The Emeigence of GQuibound Content Camoltance (IbC
`#23078, Maret! 20083.
`
`Methodology
`
`See ihe cLeam: More section fer & description of the Jormeoasting and analysis
`methodsibay ampioved iq this study.
`
`in addition, please note the following:
`
`Gl. The snfsrmation ooptaired incinis: study was serves frome the ING Software
`Market Forecaster database as af August 18.2005.
`
`JAY.
`
`oAnumbersin rig document may not be exact dusto ru nating.
`
`EY (For omors information on IDG's sofware defintians and methodelagy, se 18G's
`
`pisaos
`
`4
`
`Gefinition
`
`SCM includes policy-based content secunty setutens eesiqned. to: secure, metitor,
`filter..aind: block threats Tory riesaaging and Web traffic, SCM: gratesty aguiist
`’NBSUnd threats Such as. seem, fraudulent emails, wrnses, warns, Toland spyware.
`ang offensive material SOMsolutions re asp: deanghed te profact against autour
`ihieals Sich as:
`-<oritidental, date. cusiomer ecards,
`iitellectual property,
`ated’
`offensive panterit leaving an organzetion. SOM solutions play@key ileicétipying
`with government and-industyy cgulations as well as enforcing comporaie policies:
`SOM, aa Superset cf thtee speelfic productareas:
`
`Arttivirus software Weritifies andor eliminates tatriful sottware and Macs.
`Anivinus sottware scarts: hath drives; arial’ altachments, Toppy disks. Wee.
`pages, and sther woes of slectionic traffic (6.9...
`instank Messaging-and shett
`WS Gada;
`
`Thessage seniice [SMS{) ter any knows or potential Viriises:. ral
`Hojans, o speware.
`
`Soitware Texononiy. 2005 (OC 432854) February 2005), Secure Content Management Market
`
`ems inc
`
`#34003,
`
`CONFIDENTIAL
`
`FINJAN-BC 047430
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 11
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 11
`
`

`

`Exhibit 1 - Declaration of Hartstein - Reexam 90/013,016
`
`Bi Webtiltering sofware is used-to-sereeh and exclude fromaocess. or availability:
`Web pages that ara daamed objectionable of not-busihess related, Web filtering:
`if uiserd-hy corporations to anfarcecamarata intemet use-paticies-as well as: hy
`echockvand utiversities and home compulecowners Horparental controls],
`
`Messaging security. sclware is used-to manta, Tiler and/or block inessages
`
`fran differnt, fessagingApplications (e.g.; email IM: SMS. and P2R) containing:
`
`80am, COMPSAY confidentiai
`information, aid objectonable content: Messaging
`
`Senunty is-alsey uped by ceneie industries toeniores compliance wilh einvaty
`raQuiations jeg. HIPAA. Granim-Leach-Biiley [LB and SEC) by monitoring
`electronic riessages: tar complianceViolations, The market algo. includes secure:
`tanerypted :emel
`
`SCM vendots. énjayed anather strong year ef growth in 2004 oMajay virus-andavorn
`Guibtesiks, Continued inctedses iv Span, corpbtate ‘déatllines. for campianses with
`
`Gouennent and industry requlations. dndthe epilogue growth OFspyware aubtad jhe
`nee ful SCM secuity salulivas. Ves and. wars OflPe to He tie most genus
`threat facing “corpurallons today; put-epyware Aas tepidly: climbed. the pricry list of
`enilerpriseseounty iiveats- and howracks ae-the sectrid-tnoshserosa thréat Yecing:
`curhd-aliong today.
`
`Soywark fas became doth a secudiy and systert.maregement nightirare. 1G
`beliéves More thay thige-quarters of alt corporsié machines are-intectad wih Venous
`forms OF Spyware. Theft of confidential
`information, iass of employee productivity,
`
`
`a
`splon-of itge arioutts cl tandwidth, damage te corporate deskiaas, ard 3
`spike-in ihe. sumberhelp deshcalls related to apywate ereforcing corperations ct alt
`sizes te take action.
`
` Executive Summary
`
`Sean has oimbed back up the paodty lst of (T-managers.and-secunty depariments,
`
`ghratike as the thirdgreatest teat tc enierprise secunty.
`Eriail phishing: attaaks:
`fare nowdaily cecunences for any organization, and especially forthe largest financial
`
`
`
`instilations: arel.
`their sustariansThe purevdlume. of spank cantiies ia merease ata
`rapid pase. Spam clogs networks, sepyers..and inboxes. wilh Unwanted and oftsr
`offénsive content. The poave
`@ and efficienoy of email have been drarnatically
`
`ieguced by thevextrarialy-rapld GrowthInthe volume: of .ngedicifed commercialemal,
`Al Wereaging amaunt ofspar i being sent bys bomat of 2ombis riachines, Infact,
`IDG. believes: the inajsrity of spam senttoday onginates.from: zombierach ings
`Remobely conisiled: by spanwners.
`
`Atk anrenjing threat te carkerate secudty comesfer inskle ihe arganizaton? The
`“sider teed? of teosted enipioyses daliberately ar inadve tently Cistibubiitg. Sensis
`information is quickly Hecorting a major eanged-in. manyorganialians, The growing
`
`awarenase of Outbound content compliance (OCC) was coanty catalyzed oy a
`
`
`ries of cofdorale scandals in which eustomeér, fecords; canfidential. information, and
`
`intellectualproperty were leaked. Asthe vast malariy of thoes cases demonstrate.
`such breaches.2re olteanot the result of malicious. wrengdoing but rather eirboyess
`
`who unknowingly pulthairy companies at risk
`
`Tem
`
`#5d023.
`
`Q20gs Oe
`
`CONFIDENTIAL
`
`FINUJAN-BC 017431
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 12
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 12
`
`

`

`Exhibit 1 - Declaration of Hartstein - Reexam 90/013,016
`
`SITUATION OVERVIEW
`
`Hot Trends in the Secure Content
`Management Market
`
`Viuse end: yiorms continue to. be the most seriaus ihreatfacing corperations today,
`bul spyware has vanidly climbed the priority list of entemrise security threste. and sow
`ranks as the second iost. serous threat Factrig. corporations. today das shown tr
`Figure 1).
`
`
`Threats te Enterprise Security
`
`Trojans, viruses, worn
`and other malicigus coeds
`Spyware
`
`Spam
`Hackers
`
`
`
`
`
`leguiatery riandates
`
`Employee error (unintentional)
`
`Appiication vidnerabilities
`Wireless LANS
`
`ae
`
`Deployment of newtechnoiogy
`
`$
`
`Cyberterrotisnt
`Sabotageby current employeeor |
`business partnier
`4

`Gasual intruders.
`j
`Mobiledevines:
`Saboiage by formeremployes or |,
`business partner
`Business partner drrar funinisniiosal)
`
`Competitor espionage
`Inability to meet. goverment
`
`4
`
`2
`
`3
`(Mean score}
`
`4
`
`5
`
`Baie: TC's Sateyniay Secunty Surveys 3005
`
`CROSS
`
`#34023,
`
`2
`
`CONFIDENTIAL
`
`FISJAN-BG 047432
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 13
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 13
`
`

`

`Exhibit 1 - Declaration of Hartstein - Reexam 90/013,016
`
`Suyware: Motivated ByPraanctal Gari
`
`ywate is tow. considered tobe.the secend-egreaiest thigat to enterprise network
`security angeredng to IOC's 2008Enierorise Security Sanagp, uo-frem fourth in aot:
`
`Spywaie has quickh: become both & secudhy and: system. management nightmare,
`iDC bejeves: more thanaiiree-quanera of all corporate macnines are infected with
`vations forme of spyware: Theft: of confidential
`infemistion,
`loss: of enipleyee
`prodlinivity,. censumpton of darge -ammunts, of bandwidth,-dariagea [6 semoran
`deskiops.nde spike Incite. number hel desk calls related 16. spyware are forcing
`COMO ates ofall ‘sizes to fake action,
`‘Gur survey fesulis.
`inciagte that G4% of
`ciganizations have implemented antisnyware.
`
`Although: the consequenses.bf spyware Trey be ag Inter as: ARAGHINg adversing:
`POPUBE.Bpyware Hasthe poteniial ter ds signihcant damage to he machine and.alsc:
`® ine entire network. fifascthe-abllity tetaptures vdriealy all-caniine activity. Fron.
`janlioring all keystrokes, email anogaing, and. scanning fileson Wiehard dive io
`centire: system ur dagisity. settings: “spyware.
`is. Dots.
`a. phyackeand anteforise
`
`
`security threat. Such activities canv-lead: da identity Inet, dete. gecruptier, and:
`F
`ingly; thelt.<# company trade secrets: Hackers are alsa using: keylsggers te
`
`
`
`ie’ aeceunt information,
`iogin names, and passwords With a ew oa nt
`
`information,
`ihe hacker is then able: to obtain aweallty of personal date, including
`bans information, additonal passwords, ahd creditoad nuimbers..
`
`
`than. traditional viruses, andthe tnativatierr af-a
`Spyware is far more: saphistisated.
`Spwware. woiler is drastically dMlerent [rom that of awitus. wrilet, Spyware. is nal being
`
`seated by the younger generation of schipt. kiddies who crecte aiuseR, Seeking:
`Rersqjal pride or notonety, Soywere: wolers, Mole virus writers, ame mohvaced by
`profit and financial gain, The evolution fronmischievous: habby te a money-making,
`
`srivinal venture bas altacied < naw breed of sephisticated packets and organized
`crime, Hackers are how much lass comcermd with cesitoying systeme-and knock,
`Sul Web sites. They realize thatdey cangenerate money froang-stealing confidential
`
`perioral information and corporatedata: and selling Hto speinare of these tycived:
`in organizedorine and fraud JDC believes shesuetetaven Mmodvarion wil cause Ine
`
`numeerofattachs to iiceasain sophistication, frequency and severity.
`
`SianThreat-on the Rise Agaitt
`
`Span has ahiee: again climbed Hack up theprioritylist’of IT managers. Spam moved
`:
`Cae te a fullblowa (T
`nightmare in 2002: As many organizations:
`
`implemented antigpant: echndlegies durii¢ 2005 and 2004, spany stared ta slide
`
`pack dewr the: prionty list
`in many ITdepartments. In tact.in IDG's 2004 oriempesa
`Secunty Survey, spaar fell te Bight >place ‘on. Ha Estat. mast satiqus threats to
`enteronsé seeurity This decline was quidely. reversed, and ssarc is once again
`
`-Sonsidered:a. major security Gweal, sensing as the thitd-grealest threat to enterprise
`senurity in 2005,
`
`Syke
`
`HSAOSS.
`
`eonsake
`
`
`
`1
`
`
`
`|
`
`1
`i
`i
`dq
`
`{
`1.
`
`CONFIDENTIAL
`
`FINUAN-BC 017433
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 14
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 14
`
`

`

`Exhibit 1 - Declaration of Hartstein - Reexam 90/013,016
`
`iDC helevesthere ore several fanlors diving itetied resurgenee atspark
`
`:
`
`Y -Esrail phishing. allacks are nowdaily ovcurrenoes far any organizalion, and
`pspecally for tre iargest: tnaticial isihulens and their customers.
`rhe recent
`
`Sine Jb ema phisting-allaicks: has. createdasetae of urgencysat
`insuitutions, large Intemeé: serviceproviders (ISPs), Security techadiogy providers,
`law. enforcement: agerities,
`arid even university resedech
`labs. These
`
`“organizavans. dre-now working together ho cegreearctechnolagy solitians and
`
`Rest practices
`far curbing phishing attecks. Untlemiad authentic
`y RIB Aards:
`
`
`
`
`
`and new antighishing ablubons are widely adtpied, however. phishing. will
`BOHtINEto bea POAUIAY identity tel tedtic. FinaticalInsights, an IOS company,
`
`éstimates that global financial inetiiitions lost R400 milion or mors in 2004 ie te
`ohisking schentes. (DC: belipees thak- mote sophisticated: atlackers:: oftenfran
`
`organized -ciime, avdl
`inéreasingly usethishing. techniques:
`te obtain: permonet
`information to. perpetisie identiy iheft. The ‘numberof ohighing scams. i
`rocketing. and 1c believes the gaphistication and-scale:of online fraads and.
`identity thetts will continue ta increase ala rapid page. Antispam technologies
`ace: playing a Key raie in the detection of phishing through URL anedfor emisil
`content fering.
`
`I “The pure vilume of sham: ocntinvesid increase ala rapid pace. “Soam: cortinues
`to leg” networks, Servers, end Irbexes. with: unwanted and ofter cfensie
`
`
`
`
`gontent. Tie. convenignce and -dfficiency of a
`have beet
`tramatically
`
`fedused Bytne éxtemely: fadid inetease itcibée. volumeof gasaltited cammecial
`email. IDG bellaves ihe number at spam messages: sent daily wil eimost- double
`over the next fran years, increasing from 23 baker in 200d io 42 bilkeny:
`in 2008
`tsee Mroridwine fin f Ligage 2008-2008Forecast: Spam:Today, Olher Content
`Fomoarow, JOG 824782, August 20D4Une tieinig torrents of spa marereducing
`amas usefyindss by forcing users and IT staft-to-expeand: adgitional time and:
`energy ia dently and ddieté spamand prevent spark fon Causing arntat the
`form -of viruses. wormre,.and:offensive. content
`ISPS and. antiggam solation
` $s
`venders
`reported that spairrcurredily teprésenis 45-80% of siiabound Internet
`etal, way up from2002 levels closerto 74-30%,
`
`ingreasing atount of spam is being seat by <a: bal nebwork of zombie
`TI An:
`Machines. Indsdh (DC believes that the Majority of gpantsent today ouginates
`Nori zombie macrines. remotely conivelied By speirimens. The main’ challenge
`with-stopping span from bot networks is thal the spam originates front thoisands:
`
`
`of different:
`tetwacks: and Paditiongl ONS Slacklists used by some. antishatr
`
`programs.offer litte protection. High-profile warns such as Sabig. MyDoom, ard
`‘bagi¢- alt contained malicious code that alkwedranplé allackets fo jake over
`wfecied machines. IDC heleves. zombie machines will conlinue to. ghw-as ie
`preferred distribution too! for spammers:Moreover, we belleve zombie mazhinas
`will
`lnsreasing be: used fo sand phishing. scams, Spread viruses: download
`nernogtaphy, and steal personal information:
`
`fF) Tré-use of spamming, tachnigues to. distribute malinions emails ane viruses has
`alse increasedthe.sGesd wittl whichthese attacks can Cause significant ‘damage:
`AS a Yesult, pidsagalisn times fer malicious. efneil Viruses Have-dropped tram
`hoursda minuhes.
`,
`
`GAS
`
`#34023.
`
`Ei
`
`
`
`CONFIDENTIAL
`
`FINJAN-BC 047434
`
`Patent OwnerFinjan,Inc.
`IPR2015-01974 - Ex. 2011, p. 15
`
`Patent Owner Finjan, Inc.
`IPR2015-01974 - Ex. 2011, p. 15
`
`

`

`Exhibit 1 - Declaration of Hartstein - Reexam 90/013,016
`
`
`
`GutbaundCantent Compliance: Infarmation £eakage and Bata
`hitection
`
`information seourity Sabitons: have faaged cm acicteeaning- asierial
`Histerioally,
`lhreais le-sorporatenetworks and endocinis. Viruses, hackers: worte, troians; apatty
`blended threats, and. mosh racentiy, spyware. rave wreaked havoc on comorete
`networks-ang users alike, Inturn. eitersrises have depoyed anvexpanding ajay of
`securiby seiutions.such-a6. frewall, antivirus antisham, intrasion. deiection/praventias,
`sind antispyware to protec! the corporate perimeter frominhound threats. Todey, en
`‘emerging threattocomporstesecurily comes from diside the organization. The insider
`
`threat of trusted. employees deliberatety. or
`inadverteritly. distinuting sensitive
`information is quichy becoming amajer concern in many crganizations. This concent
`fids-created. a new marital,whieh IDG has tened anthound contest compliance,
`
`thal monitor, secereencrypt, Hter and hiock. oussqund
`OCG iieludes solutions.
`‘Sofient contaited it: amail.instant messaging, P2P, Me-Wrarisiers. Webpostings; and
`other types: ofmessaging tralfic, DOC sqlutions slay-a key role in enlarcing comorate
`gaverande, which iecdéfiiad ty IDE 26 4 combination of somplying with both
`
`asterrel tequintory tequitements.and intetial camoraie padinies and bestpractices:
`These solutions help aigarization protect agaitist the fallowitig:
`
` Viglations:oF govemmeniand industry tegulatians (HICAA; Gramn-Laach- Biiley,
`Satharies-Oxley, and: se on}
`a Violation of cépotate email policy aad-best practices
`
`Lasslleakane if imeliéstual property
`
`& Lossfeakage 6f confidential or customer intarriation
`
`Bl
`
`inappropriate pantent
`
`
`The. growing awarenessof guthound content compliance was. recentlycatalyzedbye
`series.of éorporate scandals-in whieh customer records; contidential information, and
` those cases denionstrae,
`intileciual praperty were leaked: As the wast majorly oF
`
`
`such breaches are atte: hak the
`téseltofmalicions wrorigdaing:-but rather arpogeas
`whe unknowingly nut their companies at risk: This-nay oGaut as-eipioyees send out
`email Messages tial Contain flies Gr content theyvare net aware ue conticental,
`
`ther example: ie canpioyees delivering confidential ea to thelr Web-based
`amaiiboxes, ar copyingthes: te mobile devices, and ius exposing there untrusted.
`enviconnenis. IDG belive ‘ente

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket