By using this site, you agree to the IDC Privacy Policy

Sep 2017 - IDC Perspective - Doc # US43067117

Validating the Known: A Different Approach to Cybersecurity

By: Frank DicksonResearch Vice President, Security Products, Robert Ayoub

Table of Contents

Executive Snapshot

Figure: Executive Snapshot: Validating the Known — A Different Approach to Cybersecurity

Situation Overview

A New Approach

Isolation

Whitelisting

File Sanitization

Sample Vendors

Authentic8

Bromium

Citrix

Cyberinc

Ericom Software

Fireglass (Symantec)

Glasswall

Light Point Security

Menlo Security

Ntrepid

Terra Privacy

VMware

Advice for the Technology Buyer

Learn More

Related Research

Synopsis

Content


Related Links