This IDC Perspective discusses a new approach to cybersecurity: validating the known.
"Although we have seen some innovative new offerings in the cybersecurity market, the majority of today's technologies take fundamentally the same approach: we are looking to detect the bad or malicious. A new approach is 'validating the known,' looking to validate objects as good or valid as compared with a certified list of known files or objects. Objects that cannot be validated are treated as untrusted. The binary 'good versus bad' classification gives way to validated good and invalidated," according to Frank Dickson, research director, Security Products.
Endpoint Security , Network Security Products and Strategies , Security Analytics, Intelligence, Response, and Orchestration , Security Products , Security Solutions: Security as a Service
BROMIUM, INC., Terra Privacy LLC, VMware, Inc., Authentic8 International, Cyberinc, NTREPID CORPORATION, LIGHT POINT SECURITY, LLC, Ericom Software, Inc., Menlo Security, Inc., GLASSWALL LLC, Citrix Systems, Inc., Symantec Corporation