Thwarting advanced threats with trusted crypto

In this webcast, John Grimm of Thales e-Security and John Pescatore of the SANS Institute discuss the gaps in current defenses and the ways that trusted crypto and trusted execution environments can help fill those gaps.

The dangers posed by advanced targeted attacks are real. Enterprises have come up against the limitations of approaches such as intrusion detection and signature-based malware detection. One promising avenue to explore is trusted crypto, which can help ensure that an application, for example, is doing just what its developers intended and has not been tampered with. Things can be taken a step further with trusted execution environments.