At the core of all computer applications is the "file system" as we know it. Given it's central role, the file system is frequently a target and vector of attack. This part of the security puzzle is what the Asterion Multimedia addresses. A database centric approach which implements a virtual file system. This results in the removal of the typical file system as a vector for hackers. This is such a radical tactic that many pros we talk too stare blankly at us as we begin to explain it. That's why it was so refreshing to see Martin Roesch, Vice President and Chief Architect, Cisco Security Business Group, identify the file system as a nearly universal vulnerability. Go right to 16:45 on this video of his talk "Advanced Strategies for Defending Against a New Breed of Attacks" to hear his description of the file system.
The solution they are offering, however, is more about encryption, identification and "failsafe" response techniques. Asterion's approach is to eliminate the file system vulnerability entirely. If hackers make it past your firewall or other identification-centric security methods, the file system tells them most of what they need to know in order to continue the infiltration. With the Asterion Multimedia Framework, if an infiltrator gains access they are still in the dark as there are no files or file-system to guide them !!!
Share on Facebook
Share on Twitter
I'm busy working on my blog posts. Watch this space!