Trusted Networking?

from the it's-a-step... dept

Last week we wrote about how the idea of comply and connect security was beginning to get more attention than the traditional "scan and block" method, which has been shown to be too reactive. At the time, we suggested a hybrid approach would make more sense. Furthering this point, the unfortunately named Trusted Computing Group is working on a standard for establishing security policies for a "comply and connect" system. This way, anyone can set the rules and they can be used across different vendors. The companies involved are all quite impressive, but it does seem like they're all heavily invested in this area already - meaning that the solution is likely to have compromises and be more focused on protecting business models than actually solving some of the bigger issues concerning stopping malicious attacks and files.

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here

Subscribe to the Techdirt Daily newsletter

Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Insider Shop - Show Your Support!

Essential Reading
Techdirt Insider Chat
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it

Email This

This feature is only available to registered users. Register or sign in to use it.