© 2017 by Asterion DB Inc.

  • Grey Twitter Icon
  • Grey Facebook Icon

May 18, 2017

September 23, 2016

Please reload

Recent Posts

DB Streamer: New Patent Granted!

August 26, 2017

1/4
Please reload

Featured Posts

A Core Security Weakness: The File System

June 10, 2015

At the core of all computer applications is the "file system" as we know it.  Given it's central role, the file system is frequently a target and vector of attack.  This part of the security puzzle is what the Asterion Multimedia addresses.   A database centric approach which implements a virtual file system.   This results in the removal of the typical file system as a vector for hackers.  This is such a radical tactic that many pros we talk too stare blankly at us as we begin to explain it. That's why it was so refreshing to see Martin Roesch, Vice President and Chief Architect, Cisco Security Business Group, identify the file system as a nearly universal vulnerability. Go right to 16:45 on this video of his  talk "Advanced Strategies for Defending Against a New Breed of Attacks"  to hear his description of the file system.

 

The solution they are offering, however, is more about encryption, identification and "failsafe" response techniques.  Asterion's approach is to eliminate the file system vulnerability entirely.  If hackers make it past your firewall or other identification-centric security methods, the file system tells them most of what they need to know in order to continue the infiltration.  With  the Asterion Multimedia Framework, if an infiltrator gains access they are still in the dark as there are no files or file-system to guide them !!!
 

 

 

Share on Facebook
Share on Twitter
Please reload

Follow Us

I'm busy working on my blog posts. Watch this space!

Please reload

Search By Tags
Please reload

Archive
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square