By using this site, you agree to the IDC Privacy Policy

Sep 2017 - IDC Perspective - Doc # US43067117

Validating the Known: A Different Approach to Cybersecurity

By: Frank DicksonResearch Vice President, Security Products, Robert Ayoub


This IDC Perspective discusses a new approach to cybersecurity: validating the known.

"Although we have seen some innovative new offerings in the cybersecurity market, the majority of today's technologies take fundamentally the same approach: we are looking to detect the bad or malicious. A new approach is 'validating the known,' looking to validate objects as good or valid as compared with a certified list of known files or objects. Objects that cannot be validated are treated as untrusted. The binary 'good versus bad' classification gives way to validated good and invalidated," according to Frank Dickson, research director, Security Products.



Related Links