Trusted Networking?

from the it's-a-step... dept

Last week we wrote about how the idea of comply and connect security was beginning to get more attention than the traditional "scan and block" method, which has been shown to be too reactive. At the time, we suggested a hybrid approach would make more sense. Furthering this point, the unfortunately named Trusted Computing Group is working on a standard for establishing security policies for a "comply and connect" system. This way, anyone can set the rules and they can be used across different vendors. The companies involved are all quite impressive, but it does seem like they're all heavily invested in this area already - meaning that the solution is likely to have compromises and be more focused on protecting business models than actually solving some of the bigger issues concerning stopping malicious attacks and files.

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Use markdown for basic formatting. HTML is no longer supported.
  Save me a cookie
Follow Techdirt
Special Affiliate Offer

Advertisement
Report this ad  |  Hide Techdirt ads
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Advertisement
Report this ad  |  Hide Techdirt ads
Recent Stories
Advertisement
Report this ad  |  Hide Techdirt ads

Close

Email This

This feature is only available to registered users. Register or sign in to use it.