Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 1 of 1 white paper, page 1 of 1.
IDC PERSPECTIVE - Validating the Known: A Different Approach to Cybersecurity
Let's face it. The 2017 cybersecurity reality is bleak, and the task of guarding our cyberassets is increasingly difficult. We can attribute this reality to four key trends:

Validating the Known:  A Different Approach to Cybersecurity

Let's face it. The 2017 cybersecurity reality is bleak, and the task of guarding our cyberassets is increasingly difficult. We can attribute this reality to four key trends:

1.        The sophistication of cybermiscreants is growing rapidly.
2.        The perimeter has died.
3.        Security tools are proliferated.
4.        Qualified information security professionals are scarce.
 
Although we have seen some innovative new offerings in the cybersecurity market, the majority of today's technologies take fundamentally the same approach: we are looking to detect the bad or malicious. A new approach is 'validating the known,' looking to validate objects as good or valid as compared with a certified list of known files or objects. Objects that cannot be validated are treated as untrusted. The binary 'good versus bad' classification gives way to validated good and invalidated," according to Frank Dickson, research director, Security Products.
 
Download this informative whitepaper to learn a new approach to cybersecurity: validating the known.