After 20-plus years of service, the technology remains a core part of the IT security stack despite its long predicted demise.