Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Lumension Comments On Hardware Based Security Breakthrough From Intel

Lumension Security : 27 January, 2011  (Technical Article)
With Intel promising game-changing security features on its latest technology providing non-signature based defences, Lumension executive examines what this means for IT security
In an interview, Intel CTO Justin Rattner has revealed that Intel will release technology this year that will stop zero-day threats on the device. He noted that the technology won't be signature-based, like so much security technology today is. “We're going to see a quantum jump in the ability of future devices, be they PCs or phones or tablets or smart TVs, to defend themselves against attacks."





Alan Bentley, SVP International of endpoint security firm, Lumension comments: “A shift in security thinking needs to happen to keep malware off our devices and away from our critical data. Trying to shut malware out with signature-based security technologies is like herding jelly. Signature-based security was not designed to protect against the volumes of malware that we are seeing today. If you think that known malware signatures exceed 30,000 each day, the concept of protecting against unidentified malware is more than difficult, especially if you are trying to predict what malware might look like. With this approach, it is of little surprise that malware has a habit of falling through the cracks.



“If you flip security on its head and only allow the known good onto a device or a computer network, malware protection is significantly improved.  However, this concept is not new. Effective proactive security approaches have been used in limited pockets for critical locked-down systems for some time. The delay in widespread adoption of this security mechanism has been the perceived agility of this approach. We live in an instant society and we want information at the click of a button. Checking everything before it is allowed onto a device used to slow things down.  



“Intelligent whitelisting is addressing the agility issue. Its lists can’t be overwhelmed by attack volume and it provides control over exactly what is allowed onto each device – effectively shutting out malware without interrupting user experience. And, most importantly it significantly reduces the cracks in the systems that protect our data.”  
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo