Trusted Networking?

from the it's-a-step... dept

Last week we wrote about how the idea of comply and connect security was beginning to get more attention than the traditional “scan and block” method, which has been shown to be too reactive. At the time, we suggested a hybrid approach would make more sense. Furthering this point, the unfortunately named Trusted Computing Group is working on a standard for establishing security policies for a “comply and connect” system. This way, anyone can set the rules and they can be used across different vendors. The companies involved are all quite impressive, but it does seem like they’re all heavily invested in this area already – meaning that the solution is likely to have compromises and be more focused on protecting business models than actually solving some of the bigger issues concerning stopping malicious attacks and files.


Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...